Lucene search

K
xenXen ProjectXSA-82
HistoryDec 02, 2013 - 5:13 p.m.

Guest triggerable AMD CPU erratum may cause host hang

2013-12-0217:13:00
Xen Project
xenbits.xen.org
69

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

9.3%

ISSUE DESCRIPTION

AMD CPU erratum 793 “Specific Combination of Writes to Write Combined Memory Types and Locked Instructions May Cause Core Hang” describes a situation under which a CPU core may hang.

IMPACT

A malicious guest administrator can mount a denial of service attack affecting the whole system.

VULNERABLE SYSTEMS

The vulnerability is applicable only to family 16h model 00h-0fh AMD CPUs.
Such CPUs running Xen versions 3.3 onwards are vulnerable. We have not checked earlier versions of Xen.
HVM guests can always exploit the vulnerability if it is present. PV guests can exploit the vulnerability only if they have been granted access to physical device(s).
Non-AMD CPUs are not vulnerable.

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

9.3%