xsa-182 / CVE-2016-6258

Bug #1606847 reported by Jurre
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
xen (Ubuntu)
Fix Released
Undecided
Stefan Bader

Bug Description

XSA-182[1] seems to be currently, unfixed. It's basically a host escape (break from VM into dom0) as reported by the discoverer of the bug[2] (Quarkslab)

Patches have been released by Xen as well see [1]

[1] http://xenbits.xen.org/xsa/advisory-182.html
[2] https://twitter.com/quarkslab/status/757915982513987588

CVE References

Revision history for this message
Jurre (t-jurre) wrote :

I would like to remind the Ubuntu team that this is a critical security issue since it's an VM escape!

Revision history for this message
Robie Basak (racb) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better.

This was not flagged as security so was only in the regular triage queue, not the security team's queue. I'll mark it accordingly.

information type: Public → Public Security
Revision history for this message
Jurre (t-jurre) wrote :

Woops, thanks!

In addition, the CVE explanation by mitre[1] is wrong. It mentions: "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.".

However, 64-bit PV guest's seem to be vulnerable to the same bug as I confirmed yesterday by executing the PoC[2] by Quarkslab[3] in a 64-bit guest. By putting a patched kernel on the dom0, the PoC said it was no longer vulnerable.

I dropped the patch[4] in debian/patches and made reference to it in debian/patches/series and started a build of the xen-hypervisor-4.4-amd64 package.

[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258
[2] http://blog.quarkslab.com/resources/2016-08-04-xen_exploitation_part_3_xsa_148/xsa-182-poc.tar.gz
[3] http://blog.quarkslab.com/xen-exploitation-part-3-xsa-182-qubes-escape.html
[4] http://xenbits.xen.org/xsa/advisory-182.html

Hope this helps anyone!

Changed in xen (Ubuntu):
assignee: nobody → Stefan Bader (smb)
Emily Ratliff (emilyr)
Changed in xen (Ubuntu):
status: New → Confirmed
Revision history for this message
Stefan Bader (smb) wrote :

Should now be fixed by latest security uploads.

Changed in xen (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.