Summary: | <app-emulation/xen-4.4.0-r5: information leak via gnttab_setup_table on ARM (XSA-101) (CVE-2014-4022) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/06/25/5 | ||
Whiteboard: | ~4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-06-25 15:51:25 UTC
+*xen-4.4.0-r5 (09 Jul 2014) +*xen-4.3.2-r4 (09 Jul 2014) +*xen-4.2.4-r4 (09 Jul 2014) + + 09 Jul 2014; Yixun Lan <dlan@gentoo.org> +xen-4.2.4-r4.ebuild, + +xen-4.3.2-r4.ebuild, +xen-4.4.0-r5.ebuild: + bump stable/security patches, fix bug 515106, 513824 CVE-2014-4022 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4022): The alloc_domain_struct function in arch/arm/domain.c in Xen 4.4.x, when running on an ARM platform, does not properly initialize the structure containing the grant table pages for a domain, which allows local guest administrators to obtain sensitive information via the GNTTABOP_setup_table subhypercall. Maintainer(s), Thank you for cleanup! No GLSA needed as there are no stable versions. |