Utvrđeni su višestruki propusti paketa xen koji su zlonamjernom korisniku omogućavali čitanje iz memorije sustava, povećanje ovlasti i nasilno gašenje programa.
Paket: | xen 4.x |
Operacijski sustavi: | Fedora 16, Fedora 17 |
Kritičnost: | 7.4 |
Problem: | nepravilno rukovanje ovlastima, pogreška u programskoj funkciji, pogreška u programskoj komponenti |
Iskorištavanje: | lokalno/udaljeno |
Posljedica: | dobivanje većih privilegija, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-3494, CVE-2012-3495, CVE-2012-3496, CVE-2012-3498, CVE-2012-3515, CVE-2012-4411, CVE-2012-3433, CVE-2012-3432, CVE-2012-2625, CVE-2012-0217, CVE-2012-0218, CVE-2012-2934, CVE-2012-0029 |
Izvorni ID preporuke: | FEDORA-2012-13443 |
Izvor: | Fedora |
Problem: | |
Ovi višestruki problemi rezultat su funkcije set_debugreg koja omogućava neovlašteno pisanje po rezerviranoj memoriji, nepravilnih funkcija PHYSDEVOP_get_free_pirq, XENMEM_populate_physmap, PHYSDEVOP_map_pirq, prevelikom ovlastima gostujućeg računa, prilikom MIMO operacija, zbog nepravilne komponente pv bootloader te zbog neispravnog korištenja Intel i AMD procesora. |
|
Posljedica: | |
Kao rezultat propusta zlonamjerni korisnik mogao je čitati iz radne memorije sustava, povećati privilegije ili nasilno srušiti sustav i dovesti do uskraćivanja usluge. |
|
Rješenje: | |
Svim korisnicima preporuča se hitna nadogradnja. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-13443
2012-09-07 10:40:56
--------------------------------------------------------------------------------
Name : xen
Product : Fedora 16
Version : 4.1.3
Release : 2.fc16
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
--------------------------------------------------------------------------------
Update Information:
a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]
(#854585)
a malicious crash might be able to crash the dom0 or escalate privileges
[XSA-13, CVE-2012-3495] (#854589)
a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590)
a malicious HVM guest can crash the dom0 and might be able to read
hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593)
an HVM guest could use VT100 escape sequences to escalate privileges to that
of the qemu process [XSA-17, CVE-2012-3515] (#854599)
disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
--------------------------------------------------------------------------------
ChangeLog:
* Thu Sep 6 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-2
- 6 security fixes
a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]
(#854585)
a malicious crash might be able to crash the dom0 or escalate privileges
[XSA-13, CVE-2012-3495] (#854589)
a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590)
a malicious HVM guest can crash the dom0 and might be able to read
hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593)
an HVM guest could use VT100 escape sequences to escalate privileges to
that of the qemu process [XSA-17, CVE-2012-3515] (#854599)
disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
* Sat Aug 11 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-1
- includes fix for untrusted HVM guest can cause the dom0 to hang or
crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
* Wed Aug 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-10
- remove some unnecessary cache flushing that slow things down (#841330)
* Fri Jul 27 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-9
- in rare circumstances an unprivileged user can crash an HVM guest
[XSA-10, CVE-2012-3432] (#843766)
* Wed Jun 13 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-8
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
- guest denial of service on syscall/sysenter exception generation
[CVE-2012-0218]
- PV guest host Denial of Service [CVE-2012-2934]
* Tue May 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-7
- Make the udev tap rule more specific as it breaks openvpn (#819452)
- load xen-acpi-processor module (kernel 3.4 onwards) if present
* Thu Feb 2 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-6
- Fix buffer overflow in e1000 emulation for HVM guests [CVE-2012-0029]
* Sat Jan 28 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-5
- Start building xen's ocaml libraries if appropriate unless --without ocaml
was specified
- add some backported patches from xen unstable (via Debian) for some
ocaml tidying and fixes
* Sun Jan 15 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-4
- actually apply the xend-pci-loop.patch
- compile fixes for gcc-4.7
* Wed Jan 11 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-3
- Add xend-pci-loop.patch to stop xend crashing with weird PCI cards (#767742)
- avoid a backtrace if xend can't log to the standard file or a
temporary directory (part of #741042)
* Mon Nov 21 2011 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-2
- Fix lost interrupts on emulated devices
- stop xend crashing if its state files are empty at start up
- avoid a python backtrace if xend is run on bare metal
- update grub2 configuration after the old hypervisor has gone
- move blktapctrl to systemd
- Drop obsolete dom0-kernel.repo file
* Fri Oct 21 2011 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-1
- update to 4.1.2
remove upstream patches xen-4.1-testing.23104 and xen-4.1-testing.23112
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #851139 - CVE-2012-3494 kernel: xen: hypercall set_debugreg
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=851139
[ 2 ] Bug #851165 - CVE-2012-3495 kernel: xen: hypercall physdev_get_free_pirq
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=851165
[ 3 ] Bug #851172 - CVE-2012-3496 kernel: xen: XENMEM_populate_physmap DoS
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=851172
[ 4 ] Bug #851193 - CVE-2012-3498 kernel: xen: PHYSDEVOP_map_pirq index
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=851193
[ 5 ] Bug #851252 - CVE-2012-3515 qemu: VT100 emulation vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=851252
[ 6 ] Bug #855140 - CVE-2012-4411 xen: qemu: guest administrator can access
qemu monitor console
https://bugzilla.redhat.com/show_bug.cgi?id=855140
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-13434
2012-09-07 10:40:27
--------------------------------------------------------------------------------
Name : xen
Product : Fedora 17
Version : 4.1.3
Release : 4.fc17
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
--------------------------------------------------------------------------------
Update Information:
disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
--------------------------------------------------------------------------------
ChangeLog:
* Thu Sep 6 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-4
- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
* Wed Sep 5 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-3
- 5 security fixes
a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]
(#854585)
a malicious crash might be able to crash the dom0 or escalate privileges
[XSA-13, CVE-2012-3495] (#854589)
a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590)
a malicious HVM guest can crash the dom0 and might be able to read
hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593)
an HVM guest could use VT100 escape sequences to escalate privileges to
that of the qemu process [XSA-17, CVE-2012-3515] (#854599)
* Fri Aug 10 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-1 4.1.3-2
- update to 4.1.3
includes fix for untrusted HVM guest can cause the dom0 to hang or
crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
- fix for (#845444) broke xend under systemd
* Tue Aug 7 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-25
- remove some unnecessary cache flushing that slow things down
- change python options on xend to reduce selinux problems (#845444)
* Thu Jul 26 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-24
- in rare circumstances an unprivileged user can crash an HVM guest
[XSA-10,CVE-2012-3432] (#843766)
* Tue Jul 24 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-23
- add a patch to remove a dependency on PyXML and Require python-lxml
instead of PyXML (#842843)
* Sun Jul 22 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-22
- adjust systemd service files not to report failures when running without
a hypervisor or when xendomains.service doesn't find anything to start
* Sun Jul 22 2012 Fedora Release Engineering <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> -
4.1.2-21
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Tue Jun 12 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-20
- Apply three security patches
64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
guest denial of service on syscall/sysenter exception generation
[CVE-2012-0218]
PV guest host Denial of Service [CVE-2012-2934]
* Sat Jun 9 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-19
- adjust xend.service systemd file to avoid selinux problems
* Fri Jun 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-18
- Enable xenconsoled by default under systemd (#829732)
* Thu May 17 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-16 4.1.2-17
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- add patch from 4.1.3-rc2-pre to build on F17/8
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #855140 - CVE-2012-4411 xen: qemu: guest administrator can access
qemu monitor console
https://bugzilla.redhat.com/show_bug.cgi?id=855140
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke