Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4068 ARM: Interrupts are unconditionally unmasked in exception handlers 1 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Xen Publisher: Xen Operating System: Xen Impact/Access: Increased Privileges -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-18422 Original Bulletin: http://xenbits.xen.org/xsa/advisory-303.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Xen Security Advisory CVE-2019-18422 / XSA-303 version 4 ARM: Interrupts are unconditionally unmasked in exception handlers UPDATES IN VERSION 4 ==================== Fix typoes in the series and add more reviewed-by tag. Public release. ISSUE DESCRIPTION ================= When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. IMPACT ====== A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified. VULNERABLE SYSTEMS ================== All ARM systems are vulnerable. x86 systems are not vulnerable. On some platforms this issue could possibly be exploited by an unprivileged userspace attacker. CREDITS ======= This issue was discovered by Julian Grall of Arm. RESOLUTION ========== Applying the appropriate attached patch resolves this issue. xsa303/*.patch xen-unstable .. Xen 4.9 xsa303-4.8/*.patch Xen 4.8 $ sha256sum xsa303* xsa303*/* 66b3eb28cfa633999da7480a37cd919293eb87aa730e7bc58b12c47bcdb0c9c0 xsa303.meta 7769eee9b876cdb7dde2ec664d34a5067f9b639d5c543ee89ff2eda818f04cab xsa303-4.8/0001-Revert-xen-arm32-entry-Consolidate-DEFINE_TRAP_ENTRY.patch f1337aa8c4b38f4ab61e7206c7bd8f5c782583947d9b9e1e8c6f139db73ca2cb xsa303-4.8/0002-xen-arm32-entry-Consolidate-DEFINE_TRAP_ENTRY-macros.patch 160ea6acfba85faf1cbb670b0a3873f025c0dab388f73018a22a61104e1a5fe1 xsa303-4.8/0003-xen-arm32-entry-Fold-the-macro-SAVE_ALL-in-the-macro.patch 2cc1e3282263f03c6b9c6e05039f84173b8dbc893a2cd88f80ce2275ff7478d8 xsa303-4.8/0004-xen-arm32-Don-t-blindly-unmask-interrupts-on-trap-wi.patch 63c4a90c45ae28032e0149353cafd495cce5caa8c84ad022d21b8078710e996d xsa303-4.8/0005-xen-arm64-Don-t-blindly-unmask-interrupts-on-trap-wi.patch 4da48a29aaad85a410021952b2b3cb4dae14365c688e724ed7fc80feea1334df xsa303/0001-xen-arm32-entry-Split-__DEFINE_ENTRY_TRAP-in-two.patch 99773cbfb6f0df5f0c83477c9dcd39127cb361213455bd2cb1f6bcfe4566d5a2 xsa303/0002-xen-arm32-entry-Fold-the-macro-SAVE_ALL-in-the-macro.patch 9e8241c311aa8da7fcb1da09b9d8b5a55c26a10f02355e37e97d1e7a3b6db7be xsa303/0003-xen-arm32-Don-t-blindly-unmask-interrupts-on-trap-wi.patch 4c9bc0d0b27eff06f65f1a679263ffbcc8aa4c65117840284dc115ae49e7966d xsa303/0004-xen-arm64-Don-t-blindly-unmask-interrupts-on-trap-wi.patch $ DEPLOYMENT DURING EMBARGO ========================= Deployment of the patches and/or mitigations described above (or others which are substantially similar) is permitted during the embargo, even on public-facing systems with untrusted guest users and administrators. But: Distribution of updated software is prohibited (except to other members of the predisclosure list). Predisclosure list members who wish to deploy significantly different patches and/or mitigations, please contact the Xen Project Security Team. (Note: this during-embargo deployment notice is retained in post-embargo publicly released Xen Project advisories, even though it is then no longer applicable. This is to enable the community to have oversight of the Xen Project Security Team's decisionmaking.) For more information about permissible uses of embargoed information, consult the Xen Project community's agreed Security Policy: http://www.xenproject.org/security-policy.html - -----BEGIN PGP SIGNATURE----- iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl26014MHHBncEB4ZW4u b3JnAAoJEIP+FMlX6CvZ79IIALZ04OSkaCmDXeNhb7mXPjqyNPGY8bqXwD1TQd51 W7yLo+DM/cnkj+u3UR96Mkma3eAj8sJLKeuQGRMScyyfNCj/b0pY0M1h6XRi5NLN zV6EWk7rR/87ID4Z82nwAq4lhsTgfgglH4I39oKZzFflHQtmij4DKuf/5K9g+6qT 8lc70ylgBep3Q3e73qJ1aLEvBYVnhs0lxY8QJDHOIS9GWY6/kqSVoWzK1dUtJDhD vB/MPBtG1WxJETrCjC1Fat6lmfErjqiqX/tunFVFASFPL4aOTSVA7Oo9IJYX9XSY 6f3le7BYj8xJUp7A0z2vv0YBQvOQ/bsvs4ONMRpRswwDA+Q= =eraI - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXbuLGGaOgq3Tt24GAQipdA/9HeOBboyRQEWkmvWi3dwu4rhQpFAq8+fA Qf20/Quj/JUVrq04YvRYn0jRS3z7cJnDx407k6S02U0ry+xNNezV+xsRe2CYesY7 2LTwbzBIz+dcxZLeMSAlWGU4j5Dm3YzuMxber7FsAdoK/ZB8I/V1bBR2+dhSvESv jR3Cip7NxVh+gRYbKzASGKBQRtBW7PdPynWN8a2SJJdC9bHlnUSErY+uUXDxseYl SHR5bhENd9H4KJlifiAXD+2XUYN69cj0sxkCuWmxHW21ttRYt2Dhu5MKhsSOpoob pCExSaz5x76YHtkaEjBPQQ4SsfMFCsP4bFekeu2DfW/quexAVtVsAW/5WgUhSyXR 9nkWtoiOfihxhld+cIacH41h7q0O/tN+dFxZH9lYIsTXof62CEgVIFXe3eLiWWi/ HWeWt2IOdSKPNywQgjU1159ccNiOdZYElI3+NQn6HKtCMYZXq0ZF54LaRaV95uQg 4WTLb0Z6HS5xQZv0RXmVviHIAzuWMAaEIvszGBfpD6C7wNflv+GpEdt2/eCX635y WyUrFeynWdHO2W+EUxwWADSE0nTncIETObkw6pwfZc0DZKs943EjyUzfCxGFuZZ9 mEGlw/t9fyM0CfHCHiIWTKj6Ad0sQ3YGVrFvZjNcAD19QHN4a+SLeMXlTe/jM1V2 wwn2NsuS3IE= =D5Ze -----END PGP SIGNATURE-----