On Tue, Dec 13, 2016 at 03:17:53AM +0000, Andy Smith wrote:
Hi,
On Wed, Nov 30, 2016 at 06:00:35AM +0000, Andy Smith wrote:
Rather disappointingly there's been another
round of security
advisories for Xen, some of which affect the configuration in use at
BitFolk:
The maintenance work to patch against this bug (XSA-200) has now
been completed, without incident.
Now that this is out of embargo:
http://xenbits.xen.org/xsa/advisory-200.html
…perhaps I could have a bit of feedback from you as to whether we
did the right thing in enforcing a reboot here.
Discussion around the bug (unfortunately on a private list for
discussion of the security bugs while they're under embargo, so I
can't show you) indicated that it *probably* wasn't very dangerous.
The impact is basically that a guest VM could read either 32 or 96
bits of hypervisor memory. It would probably be a different 96 bits
each time, but probably not anything private.
Of course, the Xen folks are not being paid to speculate on exactly
how exploitable that bug is, so they can't be drawn into making any
statements about how likely it is that any sensitive data could be
read. Their official analysis quite reasonably stops at "guests can
read some hypervisor memory; here is the patch for that".
As the matter was under embargo it was difficult to discuss any
further than that, hence all I've got is "it probably isn't that
serious". That was based on some insights that it seems similar to
an earlier bug that also probably wasn't as serious as its
corresponding advisory implied - bearing in mind that an advisory
should tell you the worst case. Analysis of a similar bug:
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-012-2014.txt
That one involved the ability to read a couple of kB of hypervisor
memory, whereas XSA-200 was limited to 96 bits. So XSA-200 is almost
likely less serious than XSA-108 was.
So, did we do the right thing in patching and rebooting this before
the embargo date (leading to less than 2 weeks of notice of a reboot
for customers)?
Should we have patched and rebooted but over a longer schedule?
Should we have not bothered with a reboot at all?
Cheers,
Andy
--
https://bitfolk.com/ -- No-nonsense VPS hosting