Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1486709 - (CVE-2017-14317, xsa233) CVE-2017-14317 xsa233 xen: cxenstored: Race in domain cleanup (XSA-233)
CVE-2017-14317 xsa233 xen: cxenstored: Race in domain cleanup (XSA-233)
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170912,repor...
: Security
Depends On: 1490884
Blocks:
  Show dependency treegraph
 
Reported: 2017-08-30 07:55 EDT by Adam Mariš
Modified: 2017-09-12 08:23 EDT (History)
13 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-08-30 07:55:52 EDT
ISSUE DESCRIPTION
=================

When shutting down a VM with a stubdomain, a race in cxenstored may
cause a double-free.

IMPACT
======

The xenstored daemon may crash, resulting in a DoS of any parts of the
system relying on it (including domain creation / destruction,
ballooning, device changes, etc).

VULNERABLE SYSTEMS
==================

All versions of Xen are vulnerable.

Only systems running the C version os xenstored ("xenstored") are
vulnerable; systems running the Ocaml version ("oxenstored") are not
vulnerable.

Only systems running devicemodel stubdomains are vulnerable.  Only x86
HVM guests can use stubdomains.  Therefore ARM systems, x86 systems
running only PV guests, and x86 systems running HVM guests with the
devicemodel not in a stubdomain (eg in dom0), are not vulnerable.

MITIGATION
==========

Running oxenstored will mitigate this issue.  Not using stubdomains
will also mitigate the issue.

External References:

http://xenbits.xen.org/xsa/advisory-233.html
Comment 1 Adam Mariš 2017-09-12 08:20:43 EDT
Acknowledgments:

Name: Eric Chanudet (AIS)
Comment 2 Adam Mariš 2017-09-12 08:23:39 EDT
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1490884]

Note You need to log in before you can comment on or make changes to this bug.