CVE-2015-4105
Published: 3 June 2015
Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Released
(2.0.0+dfsg-2ubuntu1.13)
|
|
upstream |
Needed
|
|
utopic |
Released
(2.1+dfsg-4ubuntu6.7)
|
|
vivid |
Released
(1:2.2+dfsg-5expubuntu9.2)
|
|
Patches: upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=b38ec5ee7a581776bbce0bdaecb397632c3c4791 |
||
qemu-kvm Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
xen Launchpad, Ubuntu, Debian |
precise |
Released
(4.1.6.1-0ubuntu0.12.04.6)
|
trusty |
Released
(4.4.2-0ubuntu0.14.04.2)
|
|
upstream |
Needed
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Not vulnerable
(code not present)
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa130-qemut.patch upstream: http://xenbits.xen.org/xsa/xsa130-qemuu-4.3.patch upstream: http://xenbits.xen.org/xsa/xsa130-qemuu.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |