~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-3715

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2014-3715
2
 
PublicDate: 2014-05-19
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3715
5
 
 http://xenbits.xen.org/xsa/advisory-95.html
6
 
 http://www.openwall.com/lists/oss-security/2014/05/16/1
7
 
 http://www.openwall.com/lists/oss-security/2014/05/15/6
8
 
 http://www.openwall.com/lists/oss-security/2014/05/14/4
9
 
Description:
10
 
 Buffer overflow in Xen 4.4.x allows local users to read system memory or
11
 
 cause a denial of service (crash) via a crafted 32-bit guest kernel,
12
 
 related to searching for an appended DTB.
13
 
Ubuntu-Description:
14
 
Notes:
15
 
 mdeslaur> 32- and 64-bit ARM systems only, 4.4.x only
16
 
Bugs:
17
 
Priority: medium
18
 
Discovered-by: Thomas Leonard
19
 
Assigned-to:
20
 
 
21
 
Patches_xen-3.3:
22
 
Tags_xen-3.3: universe-binary
23
 
upstream_xen-3.3: ignored (reached end-of-life)
24
 
lucid_xen-3.3: not-affected
25
 
precise_xen-3.3: DNE
26
 
quantal_xen-3.3: DNE
27
 
saucy_xen-3.3: DNE
28
 
trusty_xen-3.3: DNE
29
 
devel_xen-3.3: DNE
30
 
 
31
 
Patches_xen:
32
 
Tags_xen: universe-binary
33
 
upstream_xen: needs-triage
34
 
lucid_xen: DNE
35
 
precise_xen: not-affected
36
 
quantal_xen: not-affected
37
 
saucy_xen: not-affected
38
 
trusty_xen: released (4.4.0-0ubuntu5.1)
39
 
devel_xen: released (4.4.0-0ubuntu6)
40