Gentoo Archives: gentoo-announce

From: Yury German <blueknight@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201703-07 ] Xen: Privilege Escalation
Date: Tue, 28 Mar 2017 03:23:01
Message-Id: d9400384-ca62-9cb9-1716-c51fe26eb235@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201703-07
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Xen: Privilege Escalation
9 Date: March 28, 2017
10 Bugs: #609120
11 ID: 201703-07
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in Xen's bundled QEMU version might allow privilege
19 escalation.
20
21 Background
22 ==========
23
24 Xen is a bare-metal hypervisor.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 app-emulation/xen-tools < 4.7.1-r8 >= 4.7.1-r8
33
34 Description
35 ===========
36
37 In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
38 cirrus_bitblt_cputovideo fails to check wethehr the specified memory
39 region is safe.
40
41 Impact
42 ======
43
44 A local attacker could potentially execute arbitrary code with
45 privileges of Xen (QEMU) process on the host, gain privileges on the
46 host system, or cause a Denial of Service condition.
47
48 Workaround
49 ==========
50
51 Running guests in Paravirtualization (PV) mode, or running guests in
52 Hardware-assisted virtualizion (HVM) utilizing stub domains mitigate
53 the issue.
54
55 Running HVM guests with the device model in a stubdomain will mitigate
56 the issue.
57
58 Changing the video card emulation to stdvga (stdvga=1, vga="stdvga", in
59 the xl domain configuration) will avoid the vulnerability.
60
61 Resolution
62 ==========
63
64 All Xen Tools users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.7.1-r8"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2017-2620
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 https://security.gentoo.org/glsa/201703-07
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users' machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 https://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2017 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature