Summary: | app-emulation/xen-{4.2.4-r5,4.3.2-r5}: Long latency virtual-mmu operations are not preemptible (XSA-97) (CVE-2014-{5146,5149}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/08/12/4 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-08-13 09:07:31 UTC
fixed in version: xen-4.2.4-r5, xen-4.3.2-r5, xen-4.4.0-r6 Arches, please test and mark stable: =app-emulation/xen-4.2.4-r5 Target keywords : "amd64 x86" =app-emulation/xen-4.3.2-r5 Target keywords : "amd64" amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. this patch cause regressions, upstream have reverted it, current no new patches posted [xen-4.4-testing test] 29686: regressions - FAIL[1] [1] http://www.gossamer-threads.com/lists/xen/devel/344143 CVE-2014-5149 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149): Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146. CVE-2014-5146 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146): Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149. Maintainer(s), Thank you for you for cleanup. Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201504-04 at https://security.gentoo.org/glsa/201504-04 by GLSA coordinator Yury German (BlueKnight). |