First published: Thu Oct 02 2014(Updated: )
Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =19 | |
Fedora | =20 | |
Debian | =7.0 | |
Xen XAPI | =4.1.0 | |
Xen XAPI | =4.1.1 | |
Xen XAPI | =4.1.2 | |
Xen XAPI | =4.1.3 | |
Xen XAPI | =4.1.4 | |
Xen XAPI | =4.1.5 | |
Xen XAPI | =4.1.6.1 | |
Xen XAPI | =4.2.0 | |
Xen XAPI | =4.2.1 | |
Xen XAPI | =4.2.2 | |
Xen XAPI | =4.2.3 | |
Xen XAPI | =4.3.0 | |
Xen XAPI | =4.3.1 | |
Xen XAPI | =4.4.0 | |
Xen XAPI | =4.4.0-rc1 | |
Xen XAPI | =4.4.1 | |
openSUSE libeconf | =12.3 | |
openSUSE libeconf | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7154 has a severity rating that poses a potential denial of service risk to affected versions of Xen.
To fix CVE-2014-7154, upgrade to a version of Xen that is not vulnerable, specifically versions after 4.4.x.
CVE-2014-7154 affects multiple Fedora, Debian, and openSUSE versions, particularly those using Xen versions from 4.0.0 to 4.4.x.
CVE-2014-7154 exploits a race condition in the HVMOP_track_dirty_vram functionality in Xen, allowing local guest domains to cause crashes.
There are no documented workarounds for CVE-2014-7154, so upgrading to a patched version is recommended.