First published: Tue Dec 09 2014(Updated: )
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.4.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9065 has a severity rating that indicates it can lead to denial of service through host crash.
To fix CVE-2014-9065, upgrade to a version of Xen that is later than 4.4.1.
CVE-2014-9065 affects Xen versions 4.4.x and earlier, as well as openSUSE versions 13.1 and 13.2.
Exploiting CVE-2014-9065 can result in denial of service, causing host crashes or write denials.
Local x86 guest users can exploit CVE-2014-9065 by sending a large number of read requests.