First published: Thu Mar 07 2013(Updated: )
The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | =4.2.0 | |
Xen XAPI | =4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0151 has a moderate severity rating due to its potential for causing denial of service and host OS crashes.
To fix CVE-2013-0151, upgrade to Xen versions 4.2.2 or later, which include mitigations for this vulnerability.
CVE-2013-0151 affects Xen virtualization systems on the x86_32 platform running versions 4.2.0 and 4.2.1.
CVE-2013-0151 allows guest OS users with administrative access to exploit the vulnerability and potentially crash the host OS.
Yes, CVE-2013-0151 involves the handling of nested virtualization operations, specifically through the HVM_PARAM_NESTEDHVM parameter.