|
|
Log in / Subscribe / Register

xen: denial of service

Package(s):xen CVE #(s):CVE-2013-0215 CVE-2013-0153
Created:February 18, 2013 Updated:May 23, 2013
Description: From the Red Hat bugzilla [1], [2]:

[1] The oxenstored daemon (the ocaml version of the xenstore daemon) does not correctly handle unusual or malicious contents in the xenstore ring. A malicious guest can exploit this to cause oxenstored to read past the end of the ring (and very likely crash) or to allocate large amounts of RAM.

A malicious guest administrator can mount a denial of service attack affecting domain control and management functions.

[2] To avoid an erratum in early hardware, the Xen AMD IOMMU code by default chooses to use a single interrupt remapping table for the whole system. This sharing implies that any guest with a passed through PCI device that is bus mastering capable can inject interrupts into other guests, including domain 0.

Furthermore, regardless of whether a shared interrupt remapping table is in use, old entries are not always cleared, providing opportunities (which accumulate over time) for guests to inject interrupts into other guests, again including domain 0.

In a typical Xen system many devices are owned by domain 0 or driver domains, leaving them vulnerable to such an attack. Such a DoS is likely to have an impact on other guests running in the system.

A malicious domain which is given access to a physical PCI device can mount a denial of service attack affecting the whole system.

Alerts:
SUSE SUSE-SU-2014:0446-1 Xen 2014-03-25
Gentoo 201309-24 xen 2013-09-27
openSUSE openSUSE-SU-2013:0912-1 xen 2013-06-10
Oracle ELSA-2013-0847 kernel 2013-05-22
CentOS CESA-2013:0847 kernel 2013-05-22
Scientific Linux SL-kern-20130522 kernel 2013-05-22
Red Hat RHSA-2013:0847-01 kernel 2013-05-21
Debian DSA-2636-2 xen 2013-03-03
Debian DSA-2636-1 xen 2013-03-01
openSUSE openSUSE-SU-2013:0637-1 xen 2013-04-08
openSUSE openSUSE-SU-2013:0636-1 xen 2013-04-08
Fedora FEDORA-2013-2002 xen 2013-02-16
Fedora FEDORA-2013-2225 xen 2013-02-18

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds