CVE-2013-4551
Published: 18 November 2013
Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needed
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(4.3.0-1ubuntu2)
|
|
Patches: Upstream: http://lists.xen.org/archives/html/xen-announce/2013-11/bin2hKX7luNN5.bin (4.2) Upstream: http://lists.xen.org/archives/html/xen-announce/2013-11/biniGGC75KPr1.bin (4.3) |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(reached end-of-life)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |