Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
{
"binaries": [
{
"binary_name": "libxen-4.4",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "libxen-ocaml",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "libxenstore3.0",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.1-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.3-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.3-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.4-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.4-arm64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-hypervisor-4.4-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-system-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-system-arm64",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-system-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-utils-4.4",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xen-utils-common",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
},
{
"binary_name": "xenstore-utils",
"binary_version": "4.4.1-0ubuntu0.14.04.3"
}
],
"availability": "No subscription required"
}