Lucene search

K
xenXen ProjectXSA-43
HistoryFeb 05, 2013 - 12:00 p.m.

Linux pciback DoS via not rate limited log messages.

2013-02-0512:00:00
Xen Project
xenbits.xen.org
73

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.0%

ISSUE DESCRIPTION

Xen’s PCI backend drivers in Linux allow a guest with assigned PCI device(s) to cause a DoS through a flood of kernel messages, potentially affecting other domains in the system.

IMPACT

A malicious guest can mount a DoS affecting the entire system.

VULNERABLE SYSTEMS

All systems running guests with access to passed through PCI devices are vulnerable.
Both mainline (“pvops”) and classic-Xen patch kernels are affected.

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

26.0%