ID |
CVE-2014-2580
|
Summary |
The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which causes a mutex to be taken when trying to disable the interface. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.4 (as of 16-04-2014 - 13:57) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
MEDIUM |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:M/Au:S/C:N/I:N/A:C
|
refmap
via4
|
bid | 66386 | confirm | http://xenbits.xen.org/xsa/advisory-90.html | mlist | - [oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
- [oss-security] 20140324 Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
| sectrack | 1029949 |
|
Last major update |
16-04-2014 - 13:57 |
Published |
15-04-2014 - 23:13 |
Last modified |
16-04-2014 - 13:57 |