Your submission was sent successfully! Close

CVE-2015-4104

Published: 03 June 2015

Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.

Priority

Medium

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.0.0+dfsg-2ubuntu1.13)
Patches:
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=7611dae8a69f0f1775ba1a9a942961c2aa10d88e
qemu-kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
Patches:
Upstream: http://xenbits.xen.org/xsa/xsa129-qemut.patch
Upstream: http://xenbits.xen.org/xsa/xsa129-qemuu-4.3.patch
Upstream: http://xenbits.xen.org/xsa/xsa129-qemuu.patch
Binaries built from this source package are in Universe and so are supported by the community.