First published: Wed Feb 13 2013(Updated: )
The Xen netback implementation contains a couple of flaws which can allow a guest to cause a DoS in the backend domain, potentially affecting other domains in the system. <a href="https://access.redhat.com/security/cve/CVE-2013-0216">CVE-2013-0216</a> is a failure to sanity check the ring producer/consumer pointers which can allow a guest to cause netback to loop for an extended period preventing other work from occurring. <a href="https://access.redhat.com/security/cve/CVE-2013-0217">CVE-2013-0217</a> is a memory leak on an error path which is guest triggerable. A malicious guest with access to PV network devices can mount a DoS affecting the entire system. Acknowledgements: Red Hat would like to thank the Xen project for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | ||
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-910883 is typically classified as a denial of service (DoS) vulnerability affecting backend domains.
To fix REDHAT-BUG-910883, apply the latest patches released by Red Hat for your version of Red Hat Enterprise Linux.
REDHAT-BUG-910883 impacts systems using the Xen netback implementation, particularly on Red Hat Enterprise Linux.
A malicious guest can exploit REDHAT-BUG-910883 to create a denial of service condition in the backend domain.
As a temporary measure for REDHAT-BUG-910883, isolating vulnerable guest domains may help mitigate potential impacts.