Lucene search

K
xenXen ProjectXSA-74
HistoryNov 26, 2013 - 12:00 p.m.

Lock order reversal between page_alloc_lock and mm_rwlock

2013-11-2612:00:00
Xen Project
xenbits.xen.org
42

5.2 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.0%

ISSUE DESCRIPTION

The locks page_alloc_lock and mm_rwlock are not always taken in the same order. This raises the possibility of deadlock.
The incorrect order occurs only in the implementation of the deprecated domctl hypercall XEN_DOMCTL_getmemlist.

IMPACT

A malicious guest administrator may be able to deny service to the entire host.

VULNERABLE SYSTEMS

Xen 3.4.x and later are vulnerable. Xen 3.3.x and earlier are not vulnerable.
Only systems where a privileged domain frequently or predictably uses XEN_DOMCTL_getmemlist are vulnerable. (Its use by manually invoked debugging and stress testing tools is not a security problem.)
We are not aware of any toolstack software which has relevant (and hence vulnerable) uses of this hypercall. xend, libxl, xapi and libvirt are known not to do so.
We are therefore not aware of any deployed Xen-based systems which are vulnerable. We are issuing this advisory primarily for the benefit of any Xen-derived systems using unusual toolstack software.

CPENameOperatorVersion
xenge3.4.x

5.2 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.0%