ALT-PU-2014-1616-1
Closed vulnerabilities
Published: 2013-08-28
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2013-3495
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
Severity: MEDIUM (4.7)
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
References:
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://osvdb.org/96438
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8
- http://www.securityfocus.com/bid/61854
- http://www.securitytracker.com/id/1028931
- https://security.gentoo.org/glsa/201504-04
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://osvdb.org/96438
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8
- http://www.securityfocus.com/bid/61854
- http://www.securitytracker.com/id/1028931
- https://security.gentoo.org/glsa/201504-04
Published: 2014-05-02
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-3125
Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.
Severity: MEDIUM (6.2)
Vector: AV:A/AC:L/Au:S/C:N/I:P/A:C
References:
- http://secunia.com/advisories/58347
- http://www.openwall.com/lists/oss-security/2014/04/30/11
- http://www.openwall.com/lists/oss-security/2014/04/30/5
- http://www.securityfocus.com/bid/67157
- http://www.securitytracker.com/id/1030184
- http://xenbits.xen.org/xsa/advisory-91.html
- http://secunia.com/advisories/58347
- http://www.openwall.com/lists/oss-security/2014/04/30/11
- http://www.openwall.com/lists/oss-security/2014/04/30/5
- http://www.securityfocus.com/bid/67157
- http://www.securitytracker.com/id/1030184
- http://xenbits.xen.org/xsa/advisory-91.html