Xen p2m lock mutex wait Denial of Service Vulnerability (CVE-2014-9066)
Release date:
Updated on:
Affected Systems:
XenSource Xen> = 4.2
XenSource Xen
Description:
Bugtraq id: 71546
CVE (CAN) ID: CVE-2014-9066
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
Xen has the p2m lock mutex wait denial of service vulnerability in implementation. Attackers can exploit this vulnerability to crash affected applications and reject other services.
<* Source: Andrew Cooper
Link: http://seclists.org/oss-sec/2014/q4/970
*>
Suggestion:
Vendor patch:
XenSource
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://lists.xen.org/archives/html/xen-announce
Debian system install Xen and create Win2003 Virtual Machine
XenServer VM physical CPU usage policy
An error occurred while starting the system VM on XenServer in the CloudStack compiling environment.
Disable CloudStack from deleting the original XenServer Virtual Machine
Configure Linux VM boot from the optical drive in XenServer
Enable and configure the SNMP service for Citrix XenServer
Resets the local disk LVM of XenServer to the EXT3 format.
Install and configure Xen On Debian
This article permanently updates the link address: