CVE-2014-7188

Publication date 2 October 2014

Last updated 24 July 2024


Ubuntu priority

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

Read the notes from the security team

Status

Package Ubuntu Release Status
xen 15.04 vivid
Fixed 4.4.1-3ubuntu1
14.10 utopic
Fixed 4.4.0-0ubuntu8
14.04 LTS trusty
Fixed 4.4.0-0ubuntu5.2
12.04 LTS precise
Fixed 4.1.6.1-0ubuntu0.12.04.3
10.04 LTS lucid Not in release
xen-3.3 15.04 vivid Not in release
14.10 utopic Not in release
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Ignored end of life

Notes


mdeslaur

hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary