Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.4.0 (including) | 4.4.0 (including) |
Xen | Xen | 4.4.0-rc1 (including) | 4.4.0-rc1 (including) |
Xen | Ubuntu | devel | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | upstream | * |
Xen | Ubuntu | utopic | * |
Xen-3.3 | Ubuntu | upstream | * |