Bug 960093 - (CVE-2015-8615) VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169)
(CVE-2015-8615)
VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing cal...
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Xen
Current
Other Other
: P3 - Medium : Normal (vote)
: ---
Assigned To: Charles Arnold
E-mail List
http://xenbits.xen.org/xsa/advisory-1...
CVSSv2:RedHat:CVE-2015-8615:4.0:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-12-22 21:02 UTC by Andreas Stieger
Modified: 2016-01-04 23:03 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-12-22 21:02:30 UTC
From http://xenbits.xen.org/xsa/advisory-169.html

            Xen Security Advisory CVE-2015-8615 / XSA-169
                              version 2

    x86: unintentional logging upon guest changing callback method

UPDATES IN VERSION 2
====================

CVE assigned.

ISSUE DESCRIPTION
=================

HYPERVISOR_hvm_op sub-op HVMOP_set_param's HVM_PARAM_CALLBACK_IRQ
operation intends to log the new callback method in debug builds only.
The full message, however, is split into two parts, the second one of
which didn't get suppressed on non-debug builds as would have been
intended.

These log messages are not rate-limited and can be triggered by guests.

IMPACT
======

A malicious guest could cause repeated logging to the hypervisor
console, leading to a Denial of Service attack.

VULNERABLE SYSTEMS
==================

Xen version 4.6 is affected.  Older Xen versions are unaffected.

ARM systems are not affected.

Only x86 HVM guests can expose this vulnerability.

MITIGATION
==========

Running only PV guests will avoid this issue.

The problematic log messages are issued with priority Warning.
Therefore they can be rate limited by adding "loglvl=error/warning" to
the hypervisor command line or suppressed entirely by adding
"loglvl=error".

On systems where the guest kernel is controlled by the host rather
than guest administrator, running only kernels which do not excessively
invoke this operation will also prevent untrusted guest users from
exploiting this issue. However untrusted guest administrators can still
trigger it unless further steps are taken to prevent them from loading
code into the kernel (e.g. by disabling loadable modules etc) or from
using other mechanisms which allow them to run code at kernel privilege.

NOTE REGARDING LACK OF EMBARGO
==============================

The fix for this bug was publicly posted on xen-devel, before it was
appreciated that there was a security problem.

CREDITS
=======

This issue was discovered as a bug by Malcolm Crossley of Citrix; the
security impact was recognised by Jan Beulich of SuSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa169.patch        xen-unstable, Xen 4.6.x

$ sha256sum xsa169*





b818922880313cdbc12ea68ae757da5eabed9b3c9e1f8acefe1653683545ccbe  xsa169.patch
$



Affects Tumbleweed only. I don't see this one applied in the package. Can you check please?
Comment 1 Swamp Workflow Management 2015-12-22 23:00:26 UTC
bugbot adjusting priority
Comment 2 Charles Arnold 2016-01-04 23:03:28 UTC
Submitted to Factory with SR#351972
There are several other security fixes included in the submission.