First published: Thu Jun 05 2014(Updated: )
The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not properly check the return value from the IRQ setup check, which allows local HVM guest administrators to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3967 is considered a high-severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2014-3967, it is recommended to update Xen to the latest patched version that addresses this vulnerability.
CVE-2014-3967 affects Xen versions 4.2.x, 4.3.x, and 4.4.x, including specific releases like 4.2.0 through 4.2.3 and all 4.4.0 versions.
Local HVM guest administrators can exploit CVE-2014-3967 to trigger its denial of service condition.
CVE-2014-3967 can lead to a null pointer dereference, causing a crash and resulting in instability of the affected system.