CVE-2014-1895
SUSE Linux Enterprise Desktop 11 SP3,SUSE Linux Enterprise Server 11 SP3,SUSE Linux Enterprise Software Development Kit 11 SP3
CVE-2014-1895, security advisory, novell, suse linux, suse, security, cve

CVE-2014-1895

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2014-1895 at MITRE

Description

Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.85
Vector AV:A/AC:M/Au:S/C:P/I:N/A:C
Access Vector Adjacent Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact Complete
SUSE Bugzilla entry: 860165 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP3
  • xen >= 4.2.4_02-0.7.1
  • xen-doc-html >= 4.2.4_02-0.7.1
  • xen-doc-pdf >= 4.2.4_02-0.7.1
  • xen-kmp-default >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-kmp-pae >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-libs >= 4.2.4_02-0.7.1
  • xen-libs-32bit >= 4.2.4_02-0.7.1
  • xen-tools >= 4.2.4_02-0.7.1
  • xen-tools-domU >= 4.2.4_02-0.7.1
Patchnames:
sledsp3-xen-201402
SUSE Linux Enterprise Server 11 SP3
  • xen >= 4.2.4_02-0.7.1
  • xen-doc-html >= 4.2.4_02-0.7.1
  • xen-doc-pdf >= 4.2.4_02-0.7.1
  • xen-kmp-default >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-kmp-pae >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-libs >= 4.2.4_02-0.7.1
  • xen-libs-32bit >= 4.2.4_02-0.7.1
  • xen-tools >= 4.2.4_02-0.7.1
  • xen-tools-domU >= 4.2.4_02-0.7.1
Patchnames:
slessp3-xen-201402
SUSE Linux Enterprise Software Development Kit 11 SP3
  • xen-devel >= 4.2.4_02-0.7.1
Patchnames:
sdksp3-xen-201402
SUSE Linux Enterprise Software Development Kit 11 SP3
  • xen-devel >= 4.2.4_02-0.7.1
Builds
SAT Patch Nr: 8973
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 11 SP3
  • xen-kmp-default >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-kmp-pae >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-libs >= 4.2.4_02-0.7.1
  • xen-tools-domU >= 4.2.4_02-0.7.1
Builds
SAT Patch Nr: 8973
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 11 SP3
  • xen >= 4.2.4_02-0.7.1
  • xen-doc-html >= 4.2.4_02-0.7.1
  • xen-doc-pdf >= 4.2.4_02-0.7.1
  • xen-kmp-default >= 4.2.4_02_3.0.101_0.15-0.7.1
  • xen-libs >= 4.2.4_02-0.7.1
  • xen-libs-32bit >= 4.2.4_02-0.7.1
  • xen-tools >= 4.2.4_02-0.7.1
  • xen-tools-domU >= 4.2.4_02-0.7.1
Builds
SAT Patch Nr: 8973
openSUSE 12.3
  • xen >= 4.2.4_02-1.26.2
  • xen-debugsource >= 4.2.4_02-1.26.2
  • xen-devel >= 4.2.4_02-1.26.2
  • xen-doc-html >= 4.2.4_02-1.26.2
  • xen-doc-pdf >= 4.2.4_02-1.26.2
  • xen-kmp-default >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-kmp-default-debuginfo >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-kmp-desktop >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-kmp-desktop-debuginfo >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-kmp-pae >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-kmp-pae-debuginfo >= 4.2.4_02_k3.7.10_1.28-1.26.2
  • xen-libs >= 4.2.4_02-1.26.2
  • xen-libs-32bit >= 4.2.4_02-1.26.2
  • xen-libs-debuginfo >= 4.2.4_02-1.26.2
  • xen-libs-debuginfo-32bit >= 4.2.4_02-1.26.2
  • xen-tools >= 4.2.4_02-1.26.2
  • xen-tools-debuginfo >= 4.2.4_02-1.26.2
  • xen-tools-domU >= 4.2.4_02-1.26.2
  • xen-tools-domU-debuginfo >= 4.2.4_02-1.26.2
Patchnames:
openSUSE-2014-271