CVE-2015-8338
Published: 17 December 2015
Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
|
trusty |
Released
(4.4.2-0ubuntu0.14.04.4)
|
|
upstream |
Needed
|
|
vivid |
Released
(4.5.0-1ubuntu4.4)
|
|
wily |
Released
(4.5.1-0ubuntu1.2)
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa158.patch upstream: http://xenbits.xen.org/xsa/xsa158-4.4.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |