Summary: | <app-emulation/xen-{4.2.5-r2,4.3.3-r2}: multiple vulnerabilities (CVE-2014-{8594,8595,9030)} | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() +*xen-4.4.1-r3 (26 Nov 2014) +*xen-4.3.3-r2 (26 Nov 2014) +*xen-4.2.5-r2 (26 Nov 2014) + + 26 Nov 2014; Yixun Lan <dlan@gentoo.org> +xen-4.2.5-r2.ebuild, + +xen-4.3.3-r2.ebuild, +xen-4.4.1-r3.ebuild: + security version bump, bug 530182 Arches, please test and mark stable: =app-emulation/xen-4.2.5-r2 Target keywords Both : "amd64 x86" =app-emulation/xen-4.3.3-r2 Target keywords Only: "amd64" amd64 stable CVE-2014-9030 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030): The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE. CVE-2014-8595 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595): arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction. CVE-2014-8594 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594): The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer derference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP). x86 stable. Maintainer(s), please cleanup. Security, please vote. Cleaned up as part of a different bug: 21 Dec 2014; Yixun Lan <dlan@gentoo.org> -xen-4.2.5-r1.ebuild, 6 -xen-4.2.5-r2.ebuild, -xen-4.3.3-r2.ebuild, -xen-4.4.1-r3.ebuild: 7 clean old, bug 532030 Arches and Maintainer(s), Thank you for your work. GLSA Vote: Yes http://www.openwall.com/lists/oss-security/2015/01/20/10 UPDATES IN VERSION 4 ==================== Impact on applicable affected systems is a privilege escalation, not just a denial of service. (Because a PV guest can map something at 0, and its address space is visible while Xen is running, so a NULL pointer dereference can be made to do more than just crash.) Also add a caveat to the comments in Mitigation about restricted service domain images in radically disaggregated systems. Switch to B1 Security, please add it to the existing request, or file a new one. New GLSA Request filed. This issue was resolved and addressed in GLSA 201504-04 at https://security.gentoo.org/glsa/201504-04 by GLSA coordinator Yury German (BlueKnight). |