CVE-2014-3125
Published: 02 May 2014
Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [4.4.0-0ubuntu5.1])
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(reached end-of-life)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
mdeslaur | 32- and 64-bit ARM systems only, 4.4.x only |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3125
- http://xenbits.xen.org/xsa/advisory-91.html
- http://www.securitytracker.com/id/1030184
- http://www.openwall.com/lists/oss-security/2014/04/30/5
- http://www.openwall.com/lists/oss-security/2014/04/30/11
- http://secunia.com/advisories/58347
- NVD
- Launchpad
- Debian