Lucene search

K
xenXen ProjectXSA-159
HistoryDec 08, 2015 - 11:29 a.m.

XENMEM_exchange error handling issues

2015-12-0811:29:00
Xen Project
xenbits.xen.org
20

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.7%

ISSUE DESCRIPTION

Error handling in the operation may involve handing back pages to the domain. This operation may fail when in parallel the domain gets torn down. So far this failure unconditionally resulted in the host being brought down due to an internal error being assumed. This is CVE-2015-8339.
Furthermore error handling so far wrongly included the release of a lock. That lock, however, was either not acquired or already released on all paths leading to the error handling sequence. This is CVE-2015-8340.

IMPACT

A malicious guest administrator may be able to deny service by crashing the host or causing a deadlock.

VULNERABLE SYSTEMS

All Xen versions from at least 3.2 onwards are vulnerable. Older versions have not been inspected.

CPENameOperatorVersion
xenge3.2

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.7%