[XSA-260] x86: mishandling of debug exceptions

Severity High
Affected Packages 5
CVEs 1

ISSUE DESCRIPTION

When switching stacks, it is critical to have a matching stack segment
and stack pointer. To allow an atomic update from what would otherwise
be two adjacent instructions, an update which changes the stack segment
(either a mov or pop instruction with %ss encoded as the destination
register) sets the movss shadow for one instruction.

The exact behaviour of the movss shadow is poorly understood.

In practice, a movss shadow delays some debug exceptions (e.g. from a
hardware breakpoint) until the subsequent instruction has completed. If
the subsequent instruction normally transitions to supervisor mode
(e.g. a system call), then the debug exception will be taken after the
transition to ring0 is completed.

For most transitions to supervisor mode, this only confuses Xen into
printing a lot of debugging information. For the syscall instruction
however, the exception gets taken before the syscall handler can move
off the guest stack.

IMPACT

A malicious PV guest can escalate their privilege to that of the
hypervisor.

VULNERABLE SYSTEMS

All versions of Xen are vulnerable.

Only x86 systems are vulnerable. ARM systems are not vulnerable.

Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH
guests cannot exploit the vulnerability.

An attacker needs to be able to control hardware debugging facilities to
exploit the vulnerability, but such permissions are typically available
to unprivileged users.

Package Affected Version
pkg:generic/xen = 4.6.x
pkg:generic/xen = 4.7.x
pkg:generic/xen = 4.8.x
pkg:generic/xen = 4.9.x
pkg:generic/xen = 4.10.x
ID
XSA-260
Severity
high
Severity from
CVE-2018-8897
URL
http://xenbits.xen.org/xsa/advisory-260.html
Published
2018-05-08T16:45:00
(6 years ago)
Modified
2018-05-08T16:45:00
(6 years ago)
Rights
Xen Project
Other Advisories
Source # ID Name URL
Xen Project XSA-260 Security Advisory http://xenbits.xen.org/xsa/advisory-260.html
Xen Project XSA-260 Signed Security Advisory http://xenbits.xen.org/xsa/advisory-260.txt
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:generic/xen xen = 4.6.x
Affected pkg:generic/xen xen = 4.7.x
Affected pkg:generic/xen xen = 4.8.x
Affected pkg:generic/xen xen = 4.9.x
Affected pkg:generic/xen xen = 4.10.x
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...