Vulnerability Details : CVE-2014-2580
The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which causes a mutex to be taken when trying to disable the interface.
Vulnerability category: Denial of service
Products affected by CVE-2014-2580
- cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-2580
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2580
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:S/C:N/I:N/A:C |
2.7
|
6.9
|
NIST |
CWE ids for CVE-2014-2580
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2580
-
http://xenbits.xen.org/xsa/advisory-90.html
XSA-90 - Xen Security AdvisoriesPatch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2014/03/24/6
oss-security - Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
-
http://www.securitytracker.com/id/1029949
Xen Netback Packet Processing Flaw Lets Local Guest Administrators Cause Denial of Service Conditions on the Host - SecurityTracker
-
http://www.openwall.com/lists/oss-security/2014/03/24/8
oss-security - Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
-
http://www.securityfocus.com/bid/66386
Xen Linux netback CVE-2014-2580 Remote Denial of Service Vulnerability
Jump to