2014-05-24
                                                
                                                ALT-BU-2014-2788-1
Branch sisyphus update bulletin.
Closed vulnerabilities
                                                                                                                Published: 2013-08-28
Modified: 2025-04-11
                                                                                                        Modified: 2025-04-11
CVE-2013-3495
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
                                                                                                                    
                                                                                                                    
                                                                                                                        Severity: MEDIUM (4.7)
                                                                                                                    
                                                                                                                    
                                                                                                                    
                                                                                                                    
                                                                                                                        Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
                                                                                                                    
                                                                                                                    
                                                                                                                
                                                                                                            References:
                                                                                                    - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://osvdb.org/96438
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8
- http://www.securityfocus.com/bid/61854
- http://www.securitytracker.com/id/1028931
- https://security.gentoo.org/glsa/201504-04
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://osvdb.org/96438
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8
- http://www.securityfocus.com/bid/61854
- http://www.securitytracker.com/id/1028931
- https://security.gentoo.org/glsa/201504-04
