* Re: Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team)
[not found] <mailman.10477.1344525712.1399.xen-devel@lists.xen.org>
@ 2012-08-09 16:30 ` Andres Lagar-Cavilla
2012-08-09 16:40 ` George Dunlap
2012-08-09 17:15 ` Tim Deegan
0 siblings, 2 replies; 4+ messages in thread
From: Andres Lagar-Cavilla @ 2012-08-09 16:30 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson, tim, ian.campbell, security
I realize Gridcentric is neither a service provider, nor a "big vendor",
and therefore not on the pre-disclosure list.
However, this is a bug on which we have first-hand knowledge and ability
to immediately mitigate. In fact, I wrote equivalent code for 4.2/unstable
months ago.
I ignored the xen-devel discussion on pre-disclosure list (my bad), but
understand now that there may be some use to Gridcentric being in that
list.
Thanks
Andres
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Xen Security Advisory CVE-2012-3433 / XSA-11
> version 3
>
> HVM guest destroy p2m teardown host DoS vulnerability
>
> UPDATES IN VERSION 3
> ====================
>
> Embargo ended Thursday 2012-08-09 12:00:00 UTC.
>
> ISSUE DESCRIPTION
> =================
>
> An HVM guest is able to manipulate its physical address space such
> that tearing down the guest takes an extended period amount of
> time searching for shared pages.
>
> This causes the domain 0 VCPU which tears down the domain to be
> blocked in the destroy hypercall. This causes that domain 0 VCPU to
> become unavailable and may cause the domain 0 kernel to panic.
>
> There is no requirement for memory sharing to be in use.
>
> IMPACT
> ======
>
> A guest kernel can cause the host to become unresponsive for a period
> of time, potentially leading to a DoS.
>
> VULNERABLE SYSTEMS
> ==================
>
> All systems running HVM guests with untrusted guest kernels.
>
> This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier
> and xen-unstable are not vulnerable.
>
> MITIGATION
> ==========
>
> This issue can be mitigated by running PV (para-virtualised) guests
> only, or by ensuring (inside the guest) that the kernel is
> trustworthy.
>
> RESOLUTION
> ==========
>
> Applying the appropriate attached patch will resolve the issue.
>
> NOTE REGARDING CVE
> ==================
>
> We do not yet have a CVE Candidate number for this vulnerability.
>
> PATCH INFORMATION
> =================
>
> The attached patches resolve this issue
>
> Xen 4.1, 4.1.x xsa11-4.1.patch
> Xen 4.0, 4.0.x xsa11-4.0.patch
>
> $ sha256sum xsa11-*.patch
> c8ab767d831b20a1b22c69a28127303c89cf0379cbf6f1ba3acfda6240aa2a89
> xsa11-4.0.patch
> 61c6424023a26a8b4ea591d0bff6969908091a1a1e1304567d0d910908f21e8d
> xsa11-4.1.patch
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iQEcBAEBAgAGBQJQI8/0AAoJEIP+FMlX6CvZ+fIH/R8w3J9KUiLiIai/QaA4xOjp
> rkvdR40b0GzcllDQEy9bUCvRY3QPz7DRza90vLvxCL9R5OnbkRtGJxdmbxjwmoVX
> zF03FLaFCd5ypFsTGAcxaUcxtOrt6Ut6R0i8GZp5BCkOV+UkNvu/uaOxL6N3UZ3w
> HfCm88EAWsWeJuShiG5jY3BhgCeR7b3GV9uXP0vG5Pa7cwPGvMnx/E6OsC/zEMG2
> 7yTX0/AI4qKMT9XtiA024vloN1mMlRgN74ZIBqmPuDv5ggv1wLFseARWueYMBn8Y
> aUDi97nJf+YWXIx+YwAmD0XLmJ/5tTAYvaV3B4vjMrfFc/plMKDvOqohVB+hv08=
> =l4LY
> -----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team)
2012-08-09 16:30 ` Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team) Andres Lagar-Cavilla
@ 2012-08-09 16:40 ` George Dunlap
2012-08-09 16:44 ` Andres Lagar-Cavilla
2012-08-09 17:15 ` Tim Deegan
1 sibling, 1 reply; 4+ messages in thread
From: George Dunlap @ 2012-08-09 16:40 UTC (permalink / raw)
To: andres; +Cc: ian.jackson, security, tim, ian.campbell, xen-devel
On Thu, Aug 9, 2012 at 5:30 PM, Andres Lagar-Cavilla
<andres@lagarcavilla.org> wrote:
> I realize Gridcentric is neither a service provider, nor a "big vendor",
> and therefore not on the pre-disclosure list.
>
> However, this is a bug on which we have first-hand knowledge and ability
> to immediately mitigate. In fact, I wrote equivalent code for 4.2/unstable
> months ago.
I don't quite understand -- are you saying you could have helped craft
a fix? Or are you saying that you would like to be on the list for
your customers' sake?
> I ignored the xen-devel discussion on pre-disclosure list (my bad), but
> understand now that there may be some use to Gridcentric being in that
> list.
The discussion has not concluded yet; you can even still express your
voice in the "poll" here:
http://xen.org/polls/xen_dev_2012_security_process.html
It would probably be good to take a look at the discussion before
answering; at least my recent posts describing the various options and
the criteria to judge them by. :-)
Peace,
-George
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team)
2012-08-09 16:40 ` George Dunlap
@ 2012-08-09 16:44 ` Andres Lagar-Cavilla
0 siblings, 0 replies; 4+ messages in thread
From: Andres Lagar-Cavilla @ 2012-08-09 16:44 UTC (permalink / raw)
To: George Dunlap; +Cc: ian.jackson, security, tim, ian.campbell, xen-devel
> On Thu, Aug 9, 2012 at 5:30 PM, Andres Lagar-Cavilla
> <andres@lagarcavilla.org> wrote:
>> I realize Gridcentric is neither a service provider, nor a "big vendor",
>> and therefore not on the pre-disclosure list.
>>
>> However, this is a bug on which we have first-hand knowledge and ability
>> to immediately mitigate. In fact, I wrote equivalent code for
>> 4.2/unstable
>> months ago.
>
> I don't quite understand -- are you saying you could have helped craft
> a fix? Or are you saying that you would like to be on the list for
> your customers' sake?
The former primarily. But ultimately both.
>
>> I ignored the xen-devel discussion on pre-disclosure list (my bad), but
>> understand now that there may be some use to Gridcentric being in that
>> list.
>
> The discussion has not concluded yet; you can even still express your
> voice in the "poll" here:
>
> http://xen.org/polls/xen_dev_2012_security_process.html
>
> It would probably be good to take a look at the discussion before
> answering; at least my recent posts describing the various options and
> the criteria to judge them by. :-)
Yes that will take some serious groking cycles. Thanks for the link.
Andres
>
> Peace,
> -George
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team)
2012-08-09 16:30 ` Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team) Andres Lagar-Cavilla
2012-08-09 16:40 ` George Dunlap
@ 2012-08-09 17:15 ` Tim Deegan
1 sibling, 0 replies; 4+ messages in thread
From: Tim Deegan @ 2012-08-09 17:15 UTC (permalink / raw)
To: Andres Lagar-Cavilla; +Cc: ian.jackson, security, ian.campbell, xen-devel
At 09:30 -0700 on 09 Aug (1344504612), Andres Lagar-Cavilla wrote:
> I realize Gridcentric is neither a service provider, nor a "big vendor",
> and therefore not on the pre-disclosure list.
>
> However, this is a bug on which we have first-hand knowledge and ability
> to immediately mitigate. In fact, I wrote equivalent code for 4.2/unstable
> months ago.
For which, thank you -- your patch, and the description of it at the
time, made drafting this response much easier!
> I ignored the xen-devel discussion on pre-disclosure list (my bad), but
> understand now that there may be some use to Gridcentric being in that
> list.
If you mean helping draft a fix, being on the pre-disclosure list
wouldn't have made a difference (unless you see a problem with the
published fix), as that was all done before pre-disclosure.
As to whether GridCentric ought to be on the pre-disclosure list as a
downstream vendor, now is definitely the time to speak up in the
discussion of what the new policy should be.
Cheers,
Tim.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2012-08-09 17:15 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <mailman.10477.1344525712.1399.xen-devel@lists.xen.org>
2012-08-09 16:30 ` Xen Security Advisory 11 (CVE-2012-3433) - HVM destroy p2m host DoS (Xen.org security team) Andres Lagar-Cavilla
2012-08-09 16:40 ` George Dunlap
2012-08-09 16:44 ` Andres Lagar-Cavilla
2012-08-09 17:15 ` Tim Deegan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).