Bug 1335438 (CVE-2016-4962, xsa175) - CVE-2016-4962 xsa175 xen: Unsanitised guest input in libxl device handling code (XSA-175)
Summary: CVE-2016-4962 xsa175 xen: Unsanitised guest input in libxl device handling co...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-4962, xsa175
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1342132
Blocks: 1335444
TreeView+ depends on / blocked
 
Reported: 2016-05-12 08:46 UTC by Adam Mariš
Modified: 2021-02-17 03:53 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-08 02:51:45 UTC
Embargoed:


Attachments (Terms of Use)
Patch 1 (7.41 KB, patch)
2016-05-12 08:57 UTC, Adam Mariš
no flags Details | Diff
Patch 2 (2.18 KB, patch)
2016-05-12 08:57 UTC, Adam Mariš
no flags Details | Diff
Patch 3 (3.00 KB, patch)
2016-05-12 08:58 UTC, Adam Mariš
no flags Details | Diff
Patch 4 (1.36 KB, patch)
2016-05-12 08:58 UTC, Adam Mariš
no flags Details | Diff
Patch 5 (3.73 KB, patch)
2016-05-12 08:58 UTC, Adam Mariš
no flags Details | Diff
Patch 6 (3.24 KB, patch)
2016-05-12 08:59 UTC, Adam Mariš
no flags Details | Diff
Patch 7 (2.32 KB, patch)
2016-05-12 08:59 UTC, Adam Mariš
no flags Details | Diff
Patch 8 (2.05 KB, patch)
2016-05-12 08:59 UTC, Adam Mariš
no flags Details | Diff
Patch 9 (1.41 KB, patch)
2016-05-12 09:00 UTC, Adam Mariš
no flags Details | Diff
Patch 10 (2.49 KB, patch)
2016-05-12 09:00 UTC, Adam Mariš
no flags Details | Diff
Patch 11 (4.06 KB, patch)
2016-05-12 09:00 UTC, Adam Mariš
no flags Details | Diff
Patch 12 (4.68 KB, patch)
2016-05-12 09:01 UTC, Adam Mariš
no flags Details | Diff
Patch 13 (8.97 KB, patch)
2016-05-12 09:01 UTC, Adam Mariš
no flags Details | Diff

Description Adam Mariš 2016-05-12 08:46:58 UTC
ISSUE DESCRIPTION
=================

Various parts of libxl device-handling code inappropriately use
information from (partially) guest controlled areas of xenstore
(principally the frontend directory
/local/domain/GUEST/device/TYPE/DEVID,
henceforth referred to as FE).  The problems vary by device type:

For all devices other than the main PV console, the guest can write
FE/backend to point to the backend of a device belonging to a
different guest.  On subsequent domain removal (for example, by guest
reboot or migration) libxl uses this value with insufficient checks,
allowing libxl to be tricked into tearing down devices belonging to
other guests.

For almost all device types (all devices except consoles and
channels), the guest has the ability to completely remove FE.  This
will normally result in the virtual device no longer functioning
(which is bad for the guest and an outcome the guest could achieve
anyway).  But it will also cause the device not to appear in lists of
devices, and prevent the device being properly torn down during domain
destruction (including guest reboot and migration).  When such a
malicious domain is shut down, the host resources associated with the
manipulated devices may remain in use: for example, disk and nic
hotplug teardown scripts will not be run.  For resources allocated in
an manner which excludes some other accesses, this can prevent the
operation of that other software on the host (for example, it can
prevent management operations on the underlying objects); for
resources are allocated in a nonexclusive manner, the guest can
consume new resources with each successive guest boot, eventually
exhausting capacity.

For almost all device types the backend xenstore path and domid
returned to libxl's caller during query functions servicing the domain
are read from a guest-controlled part of xenstore.  This means that a
guest can cause incorrect displays in tools like xl, and possibly
cause maloperation by higher-level domain management systems.

For all device types, libxl would read the guest-writeable FE/backend
node to find the xenstore path to the backend.  A guest could write a
bad value, which would (mostly) be detected by libxl but would cause
libxl operations (including informational functions) to fail.

For consoles, vtpm and channel devices, libxl would use FE/backend
without checking, to discover important information about the device.
For vtpm devices, this means guest can manipulate the
apparently-configured uuid.  For channel devices, the guest can
manipulate the apparently-configured channel name.

For channel devices, the guest can trick console attachment tools in
the backend domain into connecting to arbitrary wrong paths on the
backend domain filesystem.

IMPACT
======

A malicious guest administrator can cause denial of service to other
guests.

A malicious guest administrator can confuse and/or deny service to
management facilities.

A malicious guest administrator of a guest configured with channel
devices may be able to escalate their privilege to that of the backend
domain (i.e., normally, to that of the host).

VULNERABLE SYSTEMS
==================

Xen systems using libxl based toolstacks (for example xl or libvirt
with the libxl driver) are vulnerable to denial of service to guests
and administrators.

Xen systems with guests configured with channel devices are possibly
vulnerable to privilege escalation by those guests.

(Channel devices are be configured with "channel=" in the xl domain
configuration file.  See
http://xenbits.xen.org/docs/4.6-testing/misc/channel.txt
for more information.)

MITIGATION
==========

Disabling channel devices in applicable guests will reduce the
impact of the vulnerability.

Limiting the frequency with which a guest is able to reboot, or
limiting or eliminating a guest's ability to be granted exclusive
access to host resources, will reduce the resource exhaustion impact.

External References:

http://xenbits.xen.org/xsa/advisory-175.html

Acknowledgements:

Name: the Xen project

Comment 1 Adam Mariš 2016-05-12 08:57:21 UTC
Created attachment 1156529 [details]
Patch 1

Comment 2 Adam Mariš 2016-05-12 08:57:42 UTC
Created attachment 1156530 [details]
Patch 2

Comment 3 Adam Mariš 2016-05-12 08:58:03 UTC
Created attachment 1156538 [details]
Patch 3

Comment 4 Adam Mariš 2016-05-12 08:58:29 UTC
Created attachment 1156546 [details]
Patch 4

Comment 5 Adam Mariš 2016-05-12 08:58:51 UTC
Created attachment 1156547 [details]
Patch 5

Comment 6 Adam Mariš 2016-05-12 08:59:13 UTC
Created attachment 1156560 [details]
Patch 6

Comment 7 Adam Mariš 2016-05-12 08:59:33 UTC
Created attachment 1156561 [details]
Patch 7

Comment 8 Adam Mariš 2016-05-12 08:59:51 UTC
Created attachment 1156562 [details]
Patch 8

Comment 9 Adam Mariš 2016-05-12 09:00:11 UTC
Created attachment 1156564 [details]
Patch 9

Comment 10 Adam Mariš 2016-05-12 09:00:31 UTC
Created attachment 1156566 [details]
Patch 10

Comment 11 Adam Mariš 2016-05-12 09:00:54 UTC
Created attachment 1156567 [details]
Patch 11

Comment 12 Adam Mariš 2016-05-12 09:01:16 UTC
Created attachment 1156568 [details]
Patch 12

Comment 13 Adam Mariš 2016-05-12 09:01:36 UTC
Created attachment 1156569 [details]
Patch 13

Comment 15 Adam Mariš 2016-06-02 13:44:01 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1342132]

Comment 16 Fedora Update System 2016-06-17 15:57:20 UTC
xen-4.5.3-8.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 17 Fedora Update System 2016-06-18 18:44:00 UTC
xen-4.6.1-11.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.