First published: Fri Aug 22 2014(Updated: )
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5146 is classified as a denial of service vulnerability affecting certain virtualization operations in Xen.
To mitigate CVE-2014-5146, upgrade to the latest version of Xen that includes the xsa97-hap patch.
CVE-2014-5146 affects Xen versions 4.2.x through 4.4.x prior to the xsa97-hap patch.
CVE-2014-5146 can lead to high virtual CPU consumption which may cause denial of service for local HVM guests.
Yes, CVE-2014-5146 affects systems running openSUSE versions 13.1 and 13.2, as well as multiple versions of Xen.