Bug 906323 (CVE-2013-0215) - CVE-2013-0215 xen: oxenstored incorrect handling of certain Xenbus ring states
Summary: CVE-2013-0215 xen: oxenstored incorrect handling of certain Xenbus ring states
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-0215
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 907888
Blocks: 906326
TreeView+ depends on / blocked
 
Reported: 2013-01-31 13:20 UTC by Petr Matousek
Modified: 2023-05-11 21:44 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:59:59 UTC
Embargoed:


Attachments (Terms of Use)

Description Petr Matousek 2013-01-31 13:20:16 UTC
The oxenstored daemon (the ocaml version of the xenstore daemon) does
not correctly handle unusual or malicious contents in the xenstore
ring.  A malicious guest can exploit this to cause oxenstored to read
past the end of the ring (and very likely crash) or to allocate large
amounts of RAM.

A malicious guest administrator can mount a denial of service attack
affecting domain control and management functions.

Acknowledgements:

Red Hat would like to thank the Xen project for reporting this issue.

Comment 2 Petr Matousek 2013-01-31 13:26:11 UTC
Statement:

This issue did not affect the versions of the xen package as shipped with Red Hat Enterprise Linux 5.

Comment 3 Petr Matousek 2013-02-05 13:29:35 UTC
Created xen tracking bugs for this issue

Affects: fedora-all [bug 907888]

Comment 4 Fedora Update System 2013-02-16 01:23:59 UTC
xen-4.1.4-4.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2013-02-18 06:49:21 UTC
xen-4.2.1-7.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.