ID CVE-2014-2580
Summary The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which causes a mutex to be taken when trying to disable the interface.
References
Vulnerable Configurations
  • cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
CVSS
Base: 4.4 (as of 16-04-2014 - 13:57)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:S/C:N/I:N/A:C
refmap via4
bid 66386
confirm http://xenbits.xen.org/xsa/advisory-90.html
mlist
  • [oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
  • [oss-security] 20140324 Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
sectrack 1029949
Last major update 16-04-2014 - 13:57
Published 15-04-2014 - 23:13
Last modified 16-04-2014 - 13:57
Back to Top