CVE-2011-1936
Publication date 7 January 2014
Last updated 24 July 2024
Ubuntu priority
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
Status
Package | Ubuntu Release | Status |
---|---|---|
xen | 12.10 quantal |
Not affected
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
xen-3.1 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Not affected
|
|
xen-3.2 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Not affected
|
|
xen-3.3 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Ignored end of life | |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release |