HIGH · 7.1

CVE-2014-9030

The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an ...

Vulnerability Description

The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.

CVSS Score

7.1

HIGH

AV:N/AC:M/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
XenXen3.2.0
DebianDebian Linux7.0
OpensuseOpensuse13.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9030?

CVE-2014-9030 is a vulnerability with a CVSS score of 7.1 (HIGH). The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an ...

How severe is CVE-2014-9030?

CVE-2014-9030 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9030?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Debian Debian Linux, Opensuse Opensuse.