Your submission was sent successfully! Close

CVE-2011-1780

Published: 7 January 2014

The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.

Priority

Medium

Status

Package Release Status
xen
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable

raring Not vulnerable

upstream Needs triage

Patches:
upstream: http://xenbits.xen.org/hg/staging/xen-unstable.hg/rev/72edc40e2942
Binaries built from this source package are in Universe and so are supported by the community.
xen-3.1
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.
xen-3.2
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.
xen-3.3
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

maverick Ignored
(reached end-of-life)
natty Ignored
(reached end-of-life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.