SB2014010703 - Multiple vulnerabilities in Xen
Published: January 7, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2014-2580)
The vulnerability allows a local #AU# to perform a denial of service (DoS) attack.
The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which causes a mutex to be taken when trying to disable the interface.
2) Input validation error (CVE-ID: CVE-2011-1936)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2014/03/24/6
- http://www.openwall.com/lists/oss-security/2014/03/24/8
- http://www.securityfocus.com/bid/66386
- http://www.securitytracker.com/id/1029949
- http://xenbits.xen.org/xsa/advisory-90.html
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- http://www.openwall.com/lists/oss-security/2011/07/07/3