Hide Forgot
The Xen netback implementation contains a couple of flaws which can allow a guest to cause a DoS in the backend domain, potentially affecting other domains in the system. CVE-2013-0216 is a failure to sanity check the ring producer/consumer pointers which can allow a guest to cause netback to loop for an extended period preventing other work from occurring. CVE-2013-0217 is a memory leak on an error path which is guest triggerable. A malicious guest with access to PV network devices can mount a DoS affecting the entire system. Acknowledgements: Red Hat would like to thank the Xen project for reporting this issue.
Created kernel tracking bugs for this issue Affects: fedora-all [bug 910886]
Statement CVE-2013-0216: This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5. This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
Statement CVE-2013-0217: Not vulnerable. This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5. This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0747 https://rhn.redhat.com/errata/RHSA-2013-0747.html