Description
The Xen netback functionality in the Linux kernel before 3.7.8 allows guest
OS users to cause a denial of service (loop) by triggering ring pointer
corruption.
Ubuntu-Description
A failure to validate input was discovered in the Linux kernel's Xen
netback (network backend) driver. A user in a guest OS may exploit this
flaw to cause a denial of service to the guest OS and other guest domains.
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was not-affected [xen net-back is dom0 side only])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1003.3)
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | ignored
(abandoned)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Package
linux-krillin: | ignored
(was pending [1.0] now end-of-life)
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was released [3.5.0-26.42~precise1])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Patches:
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | not-affected
(3.13.0-24.46~precise1)
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | not-affected
(3.16.0-25.33~14.04.2)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | not-affected
(3.19.0-18.18~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | not-affected
(4.2.0-18.22~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | not-affected
(4.4.0-13.29~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | ignored
(abandoned)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | not-affected
(3.4.0-5.22)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.2.0-1013.19)
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1012.12)
|
Package
Upstream: | released
(3.8~rc7)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was not-affected [xen net-back is dom0 side only])
|
Ubuntu 14.04 LTS (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
linux-vegetahd: | ignored
(was pending [1.0] now end-of-life)
|
Updated: 2019-01-14 22:06:46 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)