First published: Tue Apr 01 2014(Updated: )
Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1895 has a severity level that can lead to denial of service or exposure of sensitive information.
To fix CVE-2014-1895, it is recommended to upgrade to a fixed version of Xen beyond the 4.3.x series.
CVE-2014-1895 affects local users of Xen 4.2.x and 4.3.x when the maximum number of physical CPUs is in use.
CVE-2014-1895 is related to an off-by-one error that can lead to a denial of service condition.
Yes, CVE-2014-1895 can potentially expose sensitive information from hypervisor memory.