[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3140-1 xen -- xen

ID: oval:org.secpod.oval:def:601935Date: (C)2015-01-28   (M)2023-12-07
Class: PATCHFamily: unix




Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation. CVE-2014-8594 Roger Pau Monne and Jan Beulich discovered that incomplete restrictions on MMU update hypercalls may result in privilege escalation. CVE-2014-8595 Jan Beulich discovered that missing privilege level checks in the x86 emulation of far branches may result in privilege escalation. CVE-2014-8866 Jan Beulich discovered that an error in compatibility mode hypercall argument translation may result in denial of service. CVE-2014-8867 Jan Beulich discovered that an insufficient restriction in acceleration support for the "REP MOVS" instruction may result in denial of service. CVE-2014-9030 Andrew Cooper discovered a page reference leak in MMU_MACHPHYS_UPDATE handling, resulting in denial of service.

Platform:
Debian 7.0
Product:
xen-utils-4.1
Reference:
DSA-3140-1
CVE-2014-8594
CVE-2014-8595
CVE-2014-8866
CVE-2014-8867
CVE-2014-9030
CVE    5
CVE-2014-8594
CVE-2014-8595
CVE-2014-9030
CVE-2014-8866
...
CPE    2
cpe:/o:debian:debian_linux:7.x
cpe:/a:xen:xen-utils-4.1

© SecPod Technologies