TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

XSA-108 Advisory

227 点作者 ukandy超过 10 年前

17 条评论

sudowhodoido超过 10 年前
Well looks like Mr De Raadt was right again:<p><i>&#x27;x86 virtualization is about basically placing another nearly full kernel, full of new bugs, on top of a nasty x86 architecture which barely has correct page protection. Then running your operating system on the other side of this brand new pile of shit.<p>You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can&#x27;t write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes.&#x27;</i><p>Source: <a href="http://marc.info/?l=openbsd-misc&amp;m=119318909016582" rel="nofollow">http:&#x2F;&#x2F;marc.info&#x2F;?l=openbsd-misc&amp;m=119318909016582</a><p>Personally, I have hope for things like cgroups&#x2F;jails and MAC&#x2F;SELinux over virtualization.
评论 #8394019 未加载
评论 #8394575 未加载
评论 #8394032 未加载
评论 #8396502 未加载
walterbell超过 10 年前
Thanks to Jan Beulich, the SUSE Xen maintainer in Germany who is credited with finding this x86 HVM vulnerability.<p>It would be helpful if errata announcements included documentation of the static analysis tools, code review process or automated testing techniques which identified the weakness, along with a postmortem of previous audits of relevant code paths.<p>What made it possible for this issue to be identified now, when the issue escaped previous analysis, audits and tests? Such process improvement knowledge is possibly more valuable to the worldwide technical community than any point fix.<p>Heartbleed was discovered by an external party, but this issue which affects the data of millions of users was found by the originating open-source project. Kudos to Jan for finding this cross-domain escalation.
评论 #8396750 未加载
brendangregg超过 10 年前
I have to wonder if my recent blog post, &quot;The MSRs of EC2&quot;, on September 15th has prompted this discovery: <a href="http://www.brendangregg.com/blog/2014-09-15/the-msrs-of-ec2.html" rel="nofollow">http:&#x2F;&#x2F;www.brendangregg.com&#x2F;blog&#x2F;2014-09-15&#x2F;the-msrs-of-ec2....</a> . When I posted that, I could find no examples of MSR usage in EC2 or Xen.<p>I haven&#x27;t checked after the reboot, but I hope the MSRs I&#x27;m using can still be accessed: IA32_MPERF and IA32_APERF (to calculate real CPU MHz); IA32_THERM_STATUS and MSR_TEMPERATURE_TARGET (to calculate CPU temperatures); and MSR_TURBO_RATIO_LIMIT and MSR_TURBO_RATIO_LIMIT1 (to see turbo ratios).<p>I use them in the showboost, cputemp, and cpuhot MSR-based tools: <a href="https://github.com/brendangregg/msr-cloud-tools" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;brendangregg&#x2F;msr-cloud-tools</a>
评论 #8395788 未加载
alexduros超过 10 年前
interesting link ... from 2010 <a href="http://xen.1045712.n5.nabble.com/x2APIC-emulation-for-HVM-guest-td3288786.html" rel="nofollow">http:&#x2F;&#x2F;xen.1045712.n5.nabble.com&#x2F;x2APIC-emulation-for-HVM-gu...</a>
评论 #8393988 未加载
asb超过 10 年前
Can somebody please confirm that it is impossible to boot a HVM system on Linode? The hypervisor on my Linode host certainly supports HVM (according to cat &#x2F;sys&#x2F;hypervisor&#x2F;properties&#x2F;capabilities). The host Xen is 4.1 and therefore vulnerable in the case that another user could be running HV guests.
评论 #8394145 未加载
eik3_de超过 10 年前
It will be interesting to see which providers didn&#x27;t get the embargoed release.<p>So if you get a reboot announcment from your xen vps provider after today 12:00Z, you should list them here.
评论 #8393912 未加载
spydum超过 10 年前
Ouch, isn&#x27;t one of the cardinal sins of hypervisors reading memory outside of your allocation? Certainly explains the embargo
aus_超过 10 年前
I assume this is why AWS forcefully rebooted many of their VMs recently?
评论 #8393913 未加载
评论 #8393904 未加载
评论 #8393898 未加载
评论 #8396439 未加载
comex超过 10 年前
I wonder if Amazon or someone will take the time to make a ksplice-like system for Xen so that future security upgrades probably won&#x27;t have to go through such disruptive reboot events.<p>(Or, for that matter, whether they considered making an ad-hoc machine code patch - based on the source patch, it looks like it would probably be doable just by changing a few bytes. I guess it&#x27;s a bit risky...)
评论 #8398267 未加载
评论 #8400238 未加载
mappu超过 10 年前
The advisory says PV is safe and HVM is dangerous. What about PV-HVM?<p>Got a reasonably long list of VPS providers to submit tickets to.
评论 #8398460 未加载
pjungwir超过 10 年前
I had &quot;dedicated&quot; AWS instances that were rebooted. A dedicated instance means there is only one guest per box, right? So I&#x27;m curious why those had to be rebooted if there is no network-facing vector to this vulnerability. I guess because we could have read from the hypervisor&#x27;s memory?
评论 #8395944 未加载
walterbell超过 10 年前
<i>Desktop</i> risk analysis from Qubes, <a href="http://qubes-os.org" rel="nofollow">http:&#x2F;&#x2F;qubes-os.org</a> via <a href="https://groups.google.com/forum/m/#!topic/qubes-devel/HgQ_aWt-EBU" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;m&#x2F;#!topic&#x2F;qubes-devel&#x2F;HgQ_aW...</a><p>---<p>This seemingly looks like a serious problem, but if we think a little bit about the practical impact the conclusion might be quite different.<p>First, there are really no secrets or keys in the hypervisor memory that might make a good target for an exploit here. Xen hypervisor does not do encryption, neither it deals with any storage subsystems. Also there is no explicit guest memory content intermixed with the hypervisor code and data.<p>But one place to see pieces of potentially sensitive data are the Xen internal structures where the guest _registers_ are stored whenever the guest execution is interrupted (e.g. because of a trap). These registers might contain e.g. (parts of) keys or other secrets, if the guest was executing some sensitive crypto operation just before it got interrupted.<p>The vulnerability allows to read only a few kB of the hypervisor memory, with only relative addressing from the emulated APIC registers page, whose address is not known to the attacker. Still, for the exactly same systems (same binaries running, same ACPI tables, etc) it&#x27;s likely that the attacker would be able to guess the address of the APIC page. However, it is much less probable she would be able to predict what Xen structures are located in the adjacent memory. Much less the attacker would be able to control what structure are located there, as there doesn&#x27;t seem to be many ways of how a malicious HVM might be significantly affecting the layout of the hypervisor heap (e.g. force arch_vcpu structures of interesting domains to appear nearby).<p>Nevertheless, it might happen, by pure coincidence, that an arch_vcpu structure with a content of an interesting VM will just happen to be located adjacently to the emulated APIC page.<p>In that case, the next problem for the attacker would be lack of control and knowledge over the target VM execution: even if the attacker were somehow lucky to find the other VM&#x27;s register-holding-structure adjacent to the APIC page, it would still be unclear what the target VM was executing at the time it was suspended and so, whether the registers stored in the structure are worthwhile or not.<p>It is thinkable that the attacker might attempt to use some form of a heuristic, such as e.g. &quot;if RIP == X, then RAX likely contains (parts of) the important key&quot;, hoping that this specific RIP would signify a specific interesting instruction (e.g. part of some crypto library) being executed while the VM was interrupted, and so the key is to be found in one of the registers.<p>But the attacker&#x27;s memory reading exploit doesn&#x27;t offer a comfort of synchronization, so even though the attacker might be so extremely lucky as to find out that<p><pre><code> *(apic_page + guessed_offset_to_rip) == X </code></pre> (the attacker here assumes the &#x27;guessed_offset_to_rip&#x27; is the distance between the APIC page and the address where RIP is stored in the presumable arch_vcpu structure, that presumably is located adjacently), still there is no guarantees that the next read to<p><pre><code> *(apic_page + guest_offset_to_rax) </code></pre> will return the content of RAX from the same moment that RIP was snapshot (and which the attacker considered interesting).<p>Arguably the attacker might try to fire up the attack continuously, thus increasing chances of success. Assuming this won&#x27;t cause system to crash due to accessing non-mapped memory, this might sound like a somehow good strategy.<p>However, in case of a desktop system like Qubes OS, the attacker has very limited control over other domains. Unlike as in case of attacking a VM playing a role of a Web server for instance, the attacker probably won&#x27;t be able to force the target VMs to do lots of repeated crypto operations, neither choose moments when the target VM traps.<p>It seems like exploiting this bug in an IaaS scenario might be more practical, though, as the attacker also has some control of domain creation&#x2F;termination, so can affect Xen heap to some extent. But on a system like Qubes OS, it seems unlikely.<p>So, are we doomed? We likely are, but probably not because of this bug.<p>---
ivank超过 10 年前
Some impact analysis from the Qubes OS project: <a href="https://groups.google.com/forum/#!msg/qubes-devel/HgQ_aWt-EBU/8VWzu2IrQdQJ" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!msg&#x2F;qubes-devel&#x2F;HgQ_aWt-EB...</a>
otterley超过 10 年前
Patches to XenServer (releases 6.0 through 6.2) are now available from Citrix: <a href="https://support.citrix.com/article/CTX200218" rel="nofollow">https:&#x2F;&#x2F;support.citrix.com&#x2F;article&#x2F;CTX200218</a>
regularfry超过 10 年前
&gt; A buggy or malicious HVM guest can crash the host<p>Given that writes are no-ops, I don&#x27;t understand this mechanism. Can someone explain it, please?
chippy超过 10 年前
Interesting that the patch is just one characters difference (applied in two locations)<p>0x3ff to 0xff
评论 #8394013 未加载
评论 #8394120 未加载
评论 #8394221 未加载
评论 #8394022 未加载
fndrplayer13超过 10 年前
Heh, it&#x27;s been a rough couple of weeks.