Lucene search

K
osvGoogleOSV:DSA-3140-1
HistoryJan 27, 2015 - 12:00 a.m.

xen - security update

2015-01-2700:00:00
Google
osv.dev
14

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

Multiple security issues have been discovered in the Xen virtualisation
solution which may result in denial of service, information disclosure
or privilege escalation.

  • CVE-2014-8594
    Roger Pau Monne and Jan Beulich discovered that incomplete
    restrictions on MMU update hypercalls may result in privilege
    escalation.
  • CVE-2014-8595
    Jan Beulich discovered that missing privilege level checks in the
    x86 emulation of far branches may result in privilege escalation.
  • CVE-2014-8866
    Jan Beulich discovered that an error in compatibility mode hypercall
    argument translation may result in denial of service.
  • CVE-2014-8867
    Jan Beulich discovered that an insufficient restriction in
    acceleration support for the REP MOVS instruction may result in
    denial of service.
  • CVE-2014-9030
    Andrew Cooper discovered a page reference leak in MMU_MACHPHYS_UPDATE
    handling, resulting in denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 4.1.4-3+deb7u4.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.4.1-4.

For the unstable distribution (sid), these problems have been fixed in
version 4.4.1-4.

We recommend that you upgrade your xen packages.

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C