Lucene search

K
xenXen ProjectXSA-127
HistoryMar 31, 2015 - 12:00 p.m.

Certain domctl operations may be abused to lock up the host

2015-03-3112:00:00
Xen Project
xenbits.xen.org
58

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.013 Low

EPSS

Percentile

85.4%

ISSUE DESCRIPTION

XSA-77 put the majority of the domctl operations on a list excepting them from having security advisories issued for them if any effects their use might have could hamper security. Subsequently some of them got declared disaggregation safe, but for a small subset this was not really correct: Their (mis-)use may result in host lockups.
As a result, the potential security benefits of toolstack disaggregation are not always fully realised.

IMPACT

Domains deliberately given partial management control may be able to deny service to the entire host.
As a result, in a system designed to enhance security by radically disaggregating the management, the security may be reduced. But, the security will be no worse than a non-disaggregated design.

VULNERABLE SYSTEMS

Xen versions 4.3 onwards are vulnerable. Xen versions 4.2 and earlier do not have the described disaggregation functionality and hence are not vulnerable.

CPENameOperatorVersion
xenge4.3

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.013 Low

EPSS

Percentile

85.4%