Your submission was sent successfully! Close

CVE-2015-4105

Published: 03 June 2015

Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.

Priority

Medium

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.0.0+dfsg-2ubuntu1.13)
Patches:
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=b38ec5ee7a581776bbce0bdaecb397632c3c4791
qemu-kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
Patches:
Upstream: http://xenbits.xen.org/xsa/xsa130-qemut.patch
Upstream: http://xenbits.xen.org/xsa/xsa130-qemuu-4.3.patch
Upstream: http://xenbits.xen.org/xsa/xsa130-qemuu.patch
Binaries built from this source package are in Universe and so are supported by the community.