CVE-2014-2915
Published: 24 April 2014
Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.
Notes
Author | Note |
---|---|
seth-arnold | Only affects ARM 32 bit, ARM 64 bit, 4.4 and newer. Only "medium" because advisory indicates privilege escalation is not thought possible |
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
|
|
quantal |
Not vulnerable
|
|
saucy |
Not vulnerable
|
|
trusty |
Released
(4.4.0-0ubuntu5.1)
|
|
upstream |
Needed
|
|
Patches: upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/binaZ6cF2rFFv.bin upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/bin_ugBJvAPZP.bin upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/bini3rTlVIueR.bin upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/binaqo2yyFNjK.bin upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/binr2uF18q90z.bin upstream: http://lists.xen.org/archives/html/xen-announce/2014-04/biniG0pmvXkat.bin |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
saucy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Ignored
(end of life)
|
|
Binaries built from this source package are in Universe and so are supported by the community. |