xen-kernel -- arm: vgic: incorrect rate limiting of guest triggered logging
The Xen Project reports:
On ARM systems the code which deals with virtualizing the GIC
distributor would, under various circumstances, log messages on a
guest accessible code path without appropriate rate limiting.
A malicious guest could cause repeated logging to the hypervisor
console, leading to a Denial of Service attack.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright