CVE-2014-1896Improper Input Validation in XEN

Severity
4.9MEDIUMNVD
EPSS
0.1%
top 65.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Latest updateMay 17

Description

The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring."

CVSS vector

AV:A/AC:M/C:P/I:P/A:PExploitability: 4.4 | Impact: 6.4

Affected Packages3 packages

debiandebian/xen< xen 4.4.0-1 (bookworm)
Debianxen/xen< 4.4.0-1+3
NVDxen/xen7 versions+6

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8xr2-qvfg-j8q4: The (1) do_send and (2) do_recv functions in io2022-05-17
OSV
CVE-2014-1896: The (1) do_send and (2) do_recv functions in io2014-04-01

📋Vendor Advisories

2
Red Hat
xen: libvchan failure handling malicious ring indexes (xsa-86)2014-02-06
Debian
CVE-2014-1896: xen - The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3....2014

💬Community

1
Bugzilla
CVE-2014-1896 xen: libvchan failure handling malicious ring indexes (xsa-86)2014-02-06