[XSA-120] Non-maskable interrupts triggerable by guests
ISSUE DESCRIPTION
Guests are currently permitted to modify all of the (writable) bits in
the PCI command register of devices passed through to them. This in
particular allows them to disable memory and I/O decoding on the
device unless the device is an SR-IOV virtual function, in which case
subsequent accesses to the respective MMIO or I/O port ranges would
- - on PCI Express devices - lead to Unsupported Request responses. The
treatment of such errors is platform specific. (CVE-2015-2150)
(Also, the patches in XSA-120 v4 and earlier were incomplete. This
incompleteness is CVE-2015-8553. Additional patches are supplied in
XSA-120 v5 and later to resolve this issue.)
IMPACT
In the event that the platform surfaces aforementioned UR responses as
Non-Maskable Interrupts, and either the OS is configured to treat NMIs
as fatal or (e.g. via ACPI's APEI) the platform tells the OS to treat
these errors as fatal, the host would crash, leading to a Denial of
Service.
VULNERABLE SYSTEMS
Xen versions 3.3 and onwards are vulnerable due to supporting PCI
pass-through. Upstream Linux versions 3.1 and onwards are vulnerable
due to supporting PCI backend functionality. Other Linux versions as
well as other OS versions may be vulnerable too.
Any domain which is given access to a non-SR-IOV virtual function PCI
Express device can take advantage of this vulnerability.
- ID
- XSA-120
- Severity
- medium
- Severity from
- CVE-2015-8553
- URL
- http://xenbits.xen.org/xsa/advisory-120.html
- Published
-
2015-03-10T12:00:00
(9 years ago) - Modified
-
2015-03-10T12:00:00
(9 years ago) - Rights
- Xen Project
- Other Advisories
-
- DSA-3237-1
- DSA-4497-1
- ELSA-2015-3019
- ELSA-2015-3020
- ELSA-2015-3035
- ELSA-2015-3036
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-4059
- FEDORA-2015-4066
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6100
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0658-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1478-1
- SUSE-SU-2015:1592-1
- SUSE-SU-2015:1611-1
- SUSE-SU-2015:1678-1
- USN-2589-1
- USN-2590-1
- USN-2613-1
- USN-2614-1
- USN-2631-1
- USN-2632-1
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-120 | Security Advisory | http://xenbits.xen.org/xsa/advisory-120.html |
Xen Project | XSA-120 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-120.txt |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |