Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1544456 - (CVE-2018-7540, xsa252) CVE-2018-7540 xsa252 xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252)
CVE-2018-7540 xsa252 xen: DoS via non-preemptable L3/L4 pagetable freeing (XS...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180227,repor...
: Security
Depends On: 1549568
Blocks:
  Show dependency treegraph
 
Reported: 2018-02-12 09:38 EST by Adam Mariš
Modified: 2018-02-28 01:34 EST (History)
13 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2018-02-12 09:38:36 EST
ISSUE DESCRIPTION
=================

Guests have the ability to request removal of memory from themselves.
This operation is intended to be requested for normal read/write pages,
but is also permitted to be used on other types of pages.  So far this
in particular included pages pinned to their current type, with the
necessary unpinning happening implicitly.  The unpinning of higher level
page tables can, however, take a significant amount of time, and hence
is generally expected to be carried out with intermediate preemption
checks.  Such checks were missing from the code path involved here.

IMPACT
======

A malicious guest administrator can cause a Denial of Service (DoS).
Specifically, prevent use of a physical CPU for a significant period of
time.

VULNERABLE SYSTEMS
==================

All Xen versions are vulnerable.

Only x86 systems are affected.  ARM systems are not affected.

Only PV guests can leverage this vulnerability.  HVM guests cannot
leverage this vulnerability.

MITIGATION
==========

Running only HVM guests will avoid this issue.

External References:

http://xenbits.xen.org/xsa/advisory-252.html
Comment 2 Adam Mariš 2018-02-27 07:35:31 EST
Acknowledgments:

Name: the Xen project
Upstream: Jann Horn (Google)
Comment 3 Adam Mariš 2018-02-27 07:36:42 EST
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1549568]

Note You need to log in before you can comment on or make changes to this bug.