{
  "threat_severity" : "Low",
  "public_date" : "2014-11-20T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: xen: Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling",
    "id" : "1166913",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1166913"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:A/AC:H/Au:S/C:N/I:N/A:C",
    "status" : "draft"
  },
  "cwe" : "CWE-772",
  "details" : [ "The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE." ],
  "statement" : "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
  "acknowledgement" : "Red Hat would like to thank Xen project for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Affected",
    "package_name" : "kernel-xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-9030\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-9030\nhttp://xenbits.xen.org/xsa/advisory-113.html" ],
  "name" : "CVE-2014-9030",
  "csaw" : false
}