Lucene search

K
osvGoogleOSV:DSA-2544-1
HistorySep 08, 2012 - 12:00 a.m.

xen - denial of service

2012-09-0800:00:00
Google
osv.dev
7

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.4%

Multiple denial of service vulnerabilities have been discovered in Xen,
an hypervisor. The Common Vulnerabilities and Exposures project identifies
the following problems:

It was discovered that set_debugreg allows writes to reserved bits
of the DR7 debug control register on amd64 (x86-64) paravirtualised
guests, allowing a guest to crash the host.

Matthew Daley discovered that XENMEM_populate_physmap, when called
with the MEMF_populate_on_demand flag set, a BUG (detection routine)
can be triggered if a translating paging mode is not being used,
allowing a guest to crash the host.

For the stable distribution (squeeze), these problems have been fixed in
version 4.0.1-5.4.

For the testing distribution (wheezy), these problems will be fixed
soon.

For the unstable distribution (sid), these problems have been fixed in
version 4.1.3-2.

We recommend that you upgrade your xen packages.

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.4%