First published: Thu Feb 14 2013(Updated: )
Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-5634 is considered to be medium due to its potential to cause a denial of service.
To fix CVE-2012-5634, upgrade to a version of Xen that is not affected, specifically versions later than 4.2.1.
CVE-2012-5634 allows local guests to perform a denial of service attack against other guests.
Xen versions 4.0.0, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.2.0, and 4.2.1 are affected by CVE-2012-5634.
The underlying cause of CVE-2012-5634 is improper configuration of Intel VT-d related to PCI passthrough when using a legacy PCI Bridge.