Your submission was sent successfully! Close

CVE-2010-3699

Published: 08 December 2010

The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.

From the Ubuntu security team

It was discovered that Xen did not correctly clean up threads. A local attacker in a guest system could exploit this to exhaust host system resources, leading to a denial of serivce.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

linux-ec2
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream Needs triage

linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream Needs triage

Notes

AuthorNote
kees
The vulnerability described by CVE-2010-3699 probably exists, but
I've not been able to reproduce it. It likely requires more block and
network devices then I have at my disposal. Checked out
http://xenbits.xensource.com/linux-2.6.18-xen.hg and compared. Not all of
the original upstream patch was appropriate since it caused a regression
with udev.

References