Summary: | <app-emulation/xen-tools-{4.2.5-r6,4.4.2-r3,4.5.0-r5}: Multiple vulnerabilities (XSA-{128,129,130,131}) (CVE-2015-{4103,4104,4105,4106}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | dlan, idella4 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2015-05-20 08:35:45 UTC
The patches have been sent to dlan by OpenPGP encrypted mail. Now public, lifting restriction bumped in tree +*xen-tools-4.5.0-r5 (03 Jun 2015) +*xen-tools-4.4.2-r3 (03 Jun 2015) +*xen-tools-4.2.5-r6 (03 Jun 2015) Arches, please test and mark stable: =app-emulation/xen-tools-4.2.5-r6 Target keywords Both : "amd64 x86" =app-emulation/xen-tools-4.4.2-r3 Target keywords Only: "amd64" change title, since all patches apply to qemu-xen qemu-xen-traditinoal. amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. 06 Jun 2015; Ian Delaney <idella4@gentoo.org> -xen-tools-4.2.5-r5.ebuild, -xen-tools-4.4.2-r2.ebuild, -xen-tools-4.5.0-r4.ebuild: cleanup old wrt Bug #549950 CVE-2015-4106 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106): QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which mighy allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors. CVE-2015-4105 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105): Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations. CVE-2015-4104 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104): Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors. CVE-2015-4103 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103): Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields. Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request. (Under Xen) This issue was resolved and addressed in GLSA 201604-03 at https://security.gentoo.org/glsa/201604-03 by GLSA coordinator Yury German (BlueKnight). |