Summary: | <app-emulation/xen-{4.5.2-r5, 4.6.0-r9} <app-emulation/xen-tools-{4.5.2-r5, 4.6.0-r9} : Multiple vulnerabilties (CVE-2016-{2270,2271}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | idella4 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 571556 |
Description
Kristian Fiskerstrand (RETIRED)
![]() all clear for Xen 4.5.x Xen 4.6.x Public release commit ec32258807e87fb951a93726c93f823abb681ba3 Author: Ian Delaney <idella4@gentoo.org> Date: Fri Feb 19 23:59:30 2016 +0800 app-emulation/xen-tools: revbumps; 4.5.2-r5, 4.6.0-r9 add sec patches xsa170 wrt the security bug Gentoo bug: #574012 Package-Manager: portage-2.2.26 commit 9cdacdabd74f26b5141fc0a329f64fd5788267d5 Author: Ian Delaney <idella4@gentoo.org> Date: Fri Feb 19 21:41:02 2016 +0800 app-emulation/xen: revbumps; 4.5.2-r5, 4.6.0-r9 add sec patches xsa170 wrt the security bug Gentoo bug: #574012 @arches, please mark the following stable: app-emulation/xen-tools-4.5.2-r5 app-emulation/xen-tools-4.6.0-r9 TARGET KEYWORDS = amd64 x86 app-emulation/xen-4.5.2-r5 app-emulation/xen-4.6.0-r9 TARGET KEYWORDS = amd64 CVE-2016-2271 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271): VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP. CVE-2016-2270 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270): Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings. *** Bug 574010 has been marked as a duplicate of this bug. *** amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Added to existing massive GLSA :) commit 6902e0a359d140d0c8e9bbc9d6dacc5edf16d695 Author: Ian Delaney <idella4@gentoo.org> Date: Tue Mar 15 21:39:19 2016 +0800 app-emulation/xen-tools: clean old vulnerable vns. wrt the gentoo security bug Gentoo bug: #574012 ---------------------------------------------------- commit 23b1efac2e53d4e8584ee2ace8101a9c65cb6460 Author: Ian Delaney <idella4@gentoo.org> Date: Tue Mar 15 21:36:51 2016 +0800 app-emulation/xen: clean old vulnerable vns. wrt the gentoo security bug Gentoo bug: #574012 Arches and Maintainer(s), Thank you for your work. This issue was resolved and addressed in GLSA 201604-03 at https://security.gentoo.org/glsa/201604-03 by GLSA coordinator Yury German (BlueKnight). |