Summary: | <app-emulation/xen-{4.2.5-r1,4.4.1-r2}: multiple vulnerabilities (CVE-2014-{7154,7155,7156}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-09-23 13:15:37 UTC
fixed in xen-4.4.1-r2 xen-4.3.3-r1 xen-4.2.5-r1 please see bug 524200 Arches and Mainter(s), Thank you for your work. Added to an existing GLSA request. CVE-2014-7156 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156): The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors. CVE-2014-7155 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155): The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction. CVE-2014-7154 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154): Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors. This issue was resolved and addressed in GLSA 201412-42 at http://security.gentoo.org/glsa/glsa-201412-42.xml by GLSA coordinator Yury German (BlueKnight). |