CVE-2013-4551

Published: 18 November 2013

Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."

Priority

Medium

Status

Package Release Status
xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (4.3.0-1ubuntu2)
Patches:
Upstream: http://lists.xen.org/archives/html/xen-announce/2013-11/bin2hKX7luNN5.bin (4.2)
Upstream: http://lists.xen.org/archives/html/xen-announce/2013-11/biniGGC75KPr1.bin (4.3)
Binaries built from this source package are in Universe and so are supported by the community.
xen-3.3
Launchpad, Ubuntu, Debian
Upstream Ignored
(reached end-of-life)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Binaries built from this source package are in Universe and so are supported by the community.