CVE-2015-4104
Published: 3 June 2015
Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Released
(2.0.0+dfsg-2ubuntu1.13)
|
|
upstream |
Needed
|
|
utopic |
Released
(2.1+dfsg-4ubuntu6.7)
|
|
vivid |
Released
(1:2.2+dfsg-5expubuntu9.2)
|
|
Patches: upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=7611dae8a69f0f1775ba1a9a942961c2aa10d88e |
||
qemu-kvm Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
xen Launchpad, Ubuntu, Debian |
precise |
Released
(4.1.6.1-0ubuntu0.12.04.6)
|
trusty |
Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
|
|
upstream |
Needed
|
|
utopic |
Ignored
(reached end-of-life)
|
|
vivid |
Not vulnerable
(code not present)
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa129-qemut.patch upstream: http://xenbits.xen.org/xsa/xsa129-qemuu-4.3.patch upstream: http://xenbits.xen.org/xsa/xsa129-qemuu.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |