New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 797482 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Closed: Dec 2017
Cc:
Components:
EstimatedDays: ----
NextAction: 2018-01-03
OS: Chrome
Pri: 2
Type: Bug-Security



Sign in to add a comment

CVE-2017-1000407 CrOS: Vulnerability reported in Linux kernel

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Dec 23 2017

Issue description

VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel. 

Advisory: CVE-2017-1000407
  Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2017-1000407
  CVSS severity score: 6.1/10.0
  Description:

The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.



This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.

 

Comment 1 by groeck@chromium.org, Dec 23 2017

Cc: wonderfly@google.com
Labels: M-64 Security_Severity-Medium Security_Impact-Stable Pri-1
Owner: groeck@chromium.org
Status: Assigned (was: Untriaged)
d59d51f08801 KVM: VMX: remove I/O port 0x80 bypass on Intel hosts

Affected are systems running kvm.

Fix already available in chromeos-4.14 (4.14.6) and chromeos-4.4 (4.4.106) through stable tree merges. Needed in stable releases. Older releases should not run kvm and thus should not be actively affected.

Cc: kbleicher@chromium.org
Labels: -Security_Severity-Medium Merge-Request-64 Security_Severity-Low
NextAction: 2018-01-03
Status: Fixed (was: Assigned)
This looks like a DoS which we don't normally consider a security bug, though if it can be triggered from inside a VM we should probably call it at least severity low.

Asking for merge to 64 to start.
Status: Started (was: Fixed)
Sorry shouldn't yet be fixed.
Project Member

Comment 4 by sheriffbot@chromium.org, Dec 27 2017

Labels: -Merge-Request-64 Hotlist-Merge-Review Merge-Review-64
This bug requires manual review: M64 has already been promoted to the beta branch, so this requires manual review
Please contact the milestone owner if you have questions.
Owners: cmasso@(Android), cmasso@(iOS), kbleicher@(ChromeOS), abdulsyed@(Desktop)

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Confused; set as P1 but #2 seems to say otherwise?

Do we have a good feel for the criticality? 

Comment 6 by groeck@chromium.org, Dec 27 2017

I don't personally distinguish between DoS and other security bugs; my evaluation is purely based on the CVSS severity score. In my opinion, a DoS attack from a VM, affecting the core system as well as other VMs, is a severe problem. 
Possibly #2 applies to the security labels, not to the bug severity itself. If DoS vulnerabilities do not count as security vulnerabilities, maybe we need another set of labels (DoS_Severity and DoS_Impact ?

Got it.... I'll likely approve given the severity; do we have a root cause fix yet?  I'd like to look there first.  And get more background on #2 from that responder.

Comment 8 by groeck@chromium.org, Dec 27 2017

Fix - see #1. Already applied to chromeos-4.4 and chromeos-4.14. Complete link:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d59d51f088014f25c2562de59b9abff4f42a7468

Labels: -Merge-Review-64 Merge-Approved-64
Thanks Guenter..   

Seems reasonable.  Approving for M64.
Project Member

Comment 10 by sheriffbot@chromium.org, Dec 28 2017

Labels: -Pri-1 Pri-2
Project Member

Comment 11 by bugdroid1@chromium.org, Dec 28 2017

Labels: merge-merged-release-R64-10176.B-chromeos-4.4
The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/third_party/kernel/+/472fce40cc16aa5fd1e724a19c013a3fd597ed27

commit 472fce40cc16aa5fd1e724a19c013a3fd597ed27
Author: Andrew Honig <ahonig@google.com>
Date: Thu Dec 28 16:49:14 2017

UPSTREAM: KVM: VMX: remove I/O port 0x80 bypass on Intel hosts

commit d59d51f088014f25c2562de59b9abff4f42a7468 upstream.

This fixes CVE-2017-1000407.

KVM allows guests to directly access I/O port 0x80 on Intel hosts.  If
the guest floods this port with writes it generates exceptions and
instability in the host kernel, leading to a crash.  With this change
guest writes to port 0x80 on Intel will behave the same as they
currently behave on AMD systems.

Prevent the flooding by removing the code that sets port 0x80 as a
passthrough port.  This is essentially the same as upstream patch
99f85a28a78e96d28907fe036e1671a218fee597, except that patch was
for AMD chipsets and this patch is for Intel.

BUG= chromium:797482 
TEST=Flood port 0x80 from KVM client

Signed-off-by: Andrew Honig <ahonig@google.com>
Signed-off-by: Jim Mattson <jmattson@google.com>
Fixes: fdef3ad1b386 ("KVM: VMX: Enable io bitmaps to avoid IO port 0x80 VMEXITs")
Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

(cherry picked from commit a52c2829cd60492fc75bafc323145cab1af915f5)
Signed-off-by: Guenter Roeck <groeck@chromium.org>

Change-Id: I0b2001863e3a76d35a00169b0f842b7e59119673
Reviewed-on: https://chromium-review.googlesource.com/845782
Reviewed-by: Guenter Roeck <groeck@chromium.org>
Commit-Queue: Guenter Roeck <groeck@chromium.org>
Tested-by: Guenter Roeck <groeck@chromium.org>

[modify] https://crrev.com/472fce40cc16aa5fd1e724a19c013a3fd597ed27/arch/x86/kvm/vmx.c

Status: Fixed (was: Started)
Labels: -Merge-Approved-64
Project Member

Comment 14 by sheriffbot@chromium.org, Dec 29 2017

Labels: Restrict-View-SecurityNotify
Cc: adityakali@google.com
The NextAction date has arrived: 2018-01-03
Project Member

Comment 17 by sheriffbot@chromium.org, Mar 27 2018

Labels: -M-64 M-65
Project Member

Comment 18 by sheriffbot@chromium.org, Apr 6 2018

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment