Bug 1029120 (CVE-2013-4553)

Summary: CVE-2013-4553 kernel: xen: lock order reversal between page_alloc_lock and mm_rwlock
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agordeev, anton, dhoward, drjones, imammedo, jkurik, lwang, mrezanin, pbonzini, pholasek, plougher, rkrcmar, rvrbovsk, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-11-12 11:34:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1034925    
Bug Blocks: 1029116    

Description Petr Matousek 2013-11-11 17:15:33 UTC
The locks page_alloc_lock and mm_rwlock are not always taken in the same order.  This raises the possibility of deadlock.

The incorrect order occurs only in the implementation of the deprecated domctl hypercall XEN_DOMCTL_getmemlist.

A malicious guest administrator may be able to deny service to the entire host.

Acknowledgements:

Red Hat would like to thank the Xen project for reporting this issue.

Comment 5 Petr Matousek 2013-11-12 11:44:37 UTC
Statement:

Not vulnerable.

This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.

This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 as we did not have support for Xen hypervisor.

Comment 6 Petr Matousek 2013-11-26 17:34:22 UTC
This issue is public now:

  http://www.openwall.com/lists/oss-security/2013/11/26/8

Comment 7 Petr Matousek 2013-11-26 17:39:29 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1034925]