Vulnerability Description
Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | <= 4.4.1 |
| Opensuse | Opensuse | 13.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://www.openwall.com/lists/oss-security/2014/12/08/4
- http://www.securityfocus.com/bid/71546
- http://xenbits.xen.org/xsa/advisory-114.htmlPatchVendor Advisory
- https://security.gentoo.org/glsa/201504-04
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://www.openwall.com/lists/oss-security/2014/12/08/4
- http://www.securityfocus.com/bid/71546
- http://xenbits.xen.org/xsa/advisory-114.htmlPatchVendor Advisory
- https://security.gentoo.org/glsa/201504-04
FAQ
What is CVE-2014-9066?
CVE-2014-9066 is a vulnerability with a CVSS score of 4.7 (MEDIUM). Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog ...
How severe is CVE-2014-9066?
CVE-2014-9066 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9066?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Opensuse Opensuse.