Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8340

Опубликовано: 08 дек. 2015
Источник: redhat
CVSS3: 6.2
CVSS2: 6.3

Описание

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

A malicious guest administrator may be able to deny service by crashing the host or causing a deadlock by timing memory handling events between the guest and the host.

Отчет

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels. At this time, there is no plans to fix this issue, if you feel that this issue is affecting your deployment and have an EUS subscription, please contact support to have this issue correctly prioritized

Меры по смягчению последствий

The vulnerability can be avoided if the guest kernel is controlled by the host rather than guest administrator, provided that further steps are taken to prevent the guest administrator from loading code into the kernel (e.g. by disabling loadable modules etc) or from using other mechanisms which allow them to run code at kernel privilege. In Xen HVM, controlling the guest's kernel would involve locking down the bootloader.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-667
https://bugzilla.redhat.com/show_bug.cgi?id=1284919xen: XENMEM_exchange error handling may cause DoS to host

6.2 Medium

CVSS3

6.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

nvd
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

debian
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4 ...

github
больше 3 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

suse-cvrf
около 10 лет назад

Security update for xen

6.2 Medium

CVSS3

6.3 Medium

CVSS2