Red Hat Bugzilla – Full Text Bug Listing
|Summary:||CVE-2013-1918 kernel: xen: Several long latency operations are not preemptible|
|Product:||[Other] Security Response||Reporter:||Petr Matousek <pmatouse>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED WONTFIX||QA Contact:|
|Version:||unspecified||CC:||agordeev, anton, bfan, dhoward, drjones, imammedo, leiwang, lersek, lwang, moli, mrezanin, pbonzini, plougher, qguan, rvrbovsk, security-response-team, wshi|
|Fixed In Version:||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2013-04-24 09:58:58 EDT||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Bug Depends On:||956164, 956165, 958918|
Description Petr Matousek 2013-04-24 07:31:55 EDT
Page table manipulation operations for PV guests can take significant amounts of time, as they require all present branches to have their type (and thus contents) verified. While the most frequently used operations had been made preemptible in the past, some code paths involving potentially deep page table traversal were still trying to do their entire work in a single step. Malicious or buggy PV guest kernels could potentially mount a denial of service attack affecting the whole system. Acknowledgements: Red Hat would like to thank the Xen project for reporting this issue.
Comment 1 Petr Matousek 2013-04-24 07:33:08 EDT
Statement: This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5. This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. The risks associated with fixing this bug are greater than its security impact. This issue is not currently planned to be addressed in future kernel-xen updates for Red Hat Enterprise Linux 5. Using fully virtualized (HVM) guests, or PV guests with trusted kernel/administrator avoids this issue.
Comment 8 Petr Matousek 2013-05-02 12:33:27 EDT
Now public via http://seclists.org/oss-sec/2013/q2/259.