CVE-2014-5147
Published: 29 August 2014
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
|
|
trusty |
Released
(4.4.1-0ubuntu0.14.04.3)
|
|
upstream |
Released
(4.4.1)
|
|
utopic |
Released
(4.4.1-0ubuntu0.14.10.3)
|
|
Patches: upstream: http://lists.xen.org/archives/html/xen-announce/2014-08/binz34cHFpwik.bin (4.4 p1) upstream: http://lists.xen.org/archives/html/xen-announce/2014-08/binkMuZJNJa_J.bin (4.4 p2) upstream: http://lists.xen.org/archives/html/xen-announce/2014-08/binm2gYJJrZSx.bin (4.4 p3) |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Ignored
(end of life)
|
|
utopic |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |