Summary: | <app-emulation/xen-4.4.0-r6: Flaws in handling traps from 32-bit userspace on 64-bit ARM (XSA-102) (CVE-2014-5147) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/08/12/2 | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() fixed in app-emulation/xen-4.4.0-r6, vulnerable version has been cleaned. and I'm closing this bug. thanks. dlan, there need to be a few more things done when closing (like name change, whiteboard change). Just let the security team know and we can handle these, but please do not close the bugs as they no longer show up in searches that all of us have set up. CVE-2014-5147 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5147): Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process. |