[XSA-441] Possible deadlock in Linux kernel event handling
ISSUE DESCRIPTION
Closing of an event channel in the Linux kernel can result in a deadlock.
This happens when the close is being performed in parallel to an unrelated
Xen console action and the handling of a Xen console interrupt in an
unprivileged guest.
The closing of an event channel is e.g. triggered by removal of a
paravirtual device on the other side. As this action will cause console
messages to be issued on the other side quite often, the chance of
triggering the deadlock is not neglectable.
Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel
on Arm doesn't use queued-RW-locks, which are required to trigger the
issue (on Arm32 a waiting writer doesn't block further readers to get
the lock).
IMPACT
A (malicious) guest administrator could cause a denial of service (DoS)
in a backend domain (other than dom0) by disabling a paravirtualized
device.
A malicious backend could cause DoS in a guest running a Linux kernel by
disabling a paravirtualized device.
VULNERABLE SYSTEMS
All unprivileged guests running a Linux kernel of version 5.10 and later,
or with the fixes for XSA-332, are vulnerable.
All guest types are vulnerable.
Only x86- and 64-bit Arm-guests are vulnerable.
Arm-guests running in 32-bit mode are not vulnerable.
Guests not using paravirtualized drivers are not vulnerable.
Package | Affected Version |
---|---|
pkg:generic/xen |
- ID
- XSA-441
- Severity
- medium
- Severity from
- CVE-2023-34324
- URL
- http://xenbits.xen.org/xsa/advisory-441.html
- Published
-
2023-10-10T11:26:00
(11 months ago) - Modified
-
2023-10-10T11:26:00
(11 months ago) - Rights
- Xen Project
- Other Advisories
-
- ALAS-2023-1883
- ALAS2-2023-2328
- DSA-5594-1
- SSA:2023-325-01
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4346-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4349-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4359-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- USN-6461-1
- USN-6624-1
- USN-6625-1
- USN-6625-2
- USN-6625-3
- USN-6626-1
- USN-6626-2
- USN-6626-3
- USN-6628-1
- USN-6628-2
- USN-6652-1
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-441 | Security Advisory | http://xenbits.xen.org/xsa/advisory-441.html |
Xen Project | XSA-441 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-441.txt |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:generic/xen | xen |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |