First published: Mon Jan 12 2015(Updated: )
The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different VCPU.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 | |
Xen xen-unstable | =4.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6268 is classified as a denial of service vulnerability that could lead to a host crash.
To mitigate CVE-2014-6268, it is recommended to upgrade to a patched version of Xen that addresses this vulnerability.
CVE-2014-6268 affects Xen versions 4.4.0 and 4.4.1, including release candidate versions.
The impact of CVE-2014-6268 is that it allows unauthenticated local guest users to crash the host system.
CVE-2014-6268 was disclosed in 2014 as part of the Xen security advisories.