First published: Sun Jan 26 2014(Updated: )
The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.1.6.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1666 is classified as a medium to high severity vulnerability due to the potential for denial of service and unauthorized privilege escalation.
To fix CVE-2014-1666, you should update Xen to version 4.4.0 or later, which includes patches addressing this vulnerability.
CVE-2014-1666 affects Xen versions 4.1.5, 4.1.6.1, 4.2.2, 4.2.3, and 4.3.x.
If left unpatched, CVE-2014-1666 can lead to host or guest malfunctions and may allow local guests to gain elevated privileges.
Local PV guests running on affected Xen versions are at risk due to improper access controls in the do_physdev_op function.