Information
Advisory | XSA-457 |
Public release | 2024-05-07 17:11 |
Updated | 2024-05-08 22:19 |
Version | 3 |
CVE(s) | CVE-2024-27393 |
Title | Linux/xen-netfront: Memory leak due to missing cleanup function |
Files
advisory-457.txt (signed advisory file)
xsa457.patch
Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Xen Security Advisory CVE-2024-27393 / XSA-457
version 3
Linux/xen-netfront: Memory leak due to missing cleanup function
UPDATES IN VERSION 3
====================
CVE assigned.
ISSUE DESCRIPTION
=================
In netfront, xennet_alloc_one_rx_buffer() failed to call the
appropriate clean-up function, resulting in a memory leak.
IMPACT
======
A malicious guest userspace process can exhaust memory resources
within the guest kernel, potentially leading to a guest crash (Denial
of Service). It is not known whether it can be triggered remotely.
VULNERABLE SYSTEMS
==================
Systems with guests running Linux 5.9 and later with Xen PV network
devices are affected.
MITIGATION
==========
For HVM guests, using emulated network devices will avoid this issue.
RESOLUTION
==========
The following patch in Linux resolves the issue:
https://git.kernel.org/torvalds/c/037965402a010898d34f4e35327d22c0a95cd51f
A copy of which is attached.
xsa457.patch Linux 5.9
$ sha256sum xsa457*
9d6ae3da27f1ff92f9f45c800822beecda603d6dea6726207cee6c768416114c xsa457.patch
$
NOTE ON THE LACK OF EMBARGO
===========================
The issue was reported initially on a public bug tracker and fixed in
public before it was realized that there was a security aspect.
-----BEGIN PGP SIGNATURE-----
iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmY7+mgMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZIygH/2qlkovJs5zZy4dTpsygoSnSiv6L31r2IGmMnR/c
qdgtfedzctQ/ibw0iaz/37w/d0F3lo/lg3iWnVgCcIfV384MvvoArFsOZ4v/RRXL
b0XiNCb0k5xLpw9R86f7oG7cDw59JU+sXVjBH6GcVo86yL+HKaeli7/FZb9zkz/D
VRushpxeA353u3FFdqHJcFlD68wA5nhM2JdjkPk1rrgPVc0sBLjHwrcFOrHHHuuq
epYSYzWEf5HGbOf+zg6NY9B0uD4Vb9J3xa+xcYaHfPlQ1Jexw5GA7vBMO82qcR57
lRwAOav844fHw+lNxizfg8+4ayFpOCyGX2WEag6qjN92qJE=
=mMwm
-----END PGP SIGNATURE-----
Xenproject.org Security Team