First published: Mon Dec 01 2014(Updated: )
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5.0 | |
redhat enterprise Linux desktop | =5.0 | |
Xen xen-unstable | <=3.2.0 | |
Xen xen-unstable | =3.2.1 | |
Xen xen-unstable | =3.2.2 | |
Xen xen-unstable | =3.2.3 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.1 | |
Debian GNU/Linux | =7.0 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8867 is a medium severity vulnerability that can lead to denial of service, including host crashes.
To fix CVE-2014-8867, you should apply the latest security patches provided for the affected versions of Xen and related operating systems.
CVE-2014-8867 affects Xen 4.4.x, 3.2.x, and earlier, as well as specific versions of Red Hat Enterprise Linux, Debian Linux, and openSUSE.
Yes, local HVM guests can exploit CVE-2014-8867 to cause a denial of service on the host system.
The potential impacts of CVE-2014-8867 include system instability and crashing of the hypervisor, leading to downtime for hosted virtual machines.