Summary: | <app-emulation/xen-4.8.2-r3: x86 infinite loop due to missing PoD error checking (XSA-246) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Yury German <blueknight> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | dlan |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa+ cve] | ||
Package list: |
app-emulation/xen-4.8.2-r3
|
Runtime testing required: | --- |
Description
Yury German
![]() ![]() xen - x86 not stable xen-tools (x86) is stable - if Xen-tools is not affected please advise will change whiteboard to ~3 app-emulation/xen is not keyworded on x86. app-emulation/xen{,-pvgrub,-tools} are not vulnerable. http://xenbits.xen.org/xsa/xsa246.patch Re-opening as this does impact amd64 hosts running x86 HVM guests with improper configurations. @maintainer, can you let us know if POD is properly configured per the XSA by default in Gentoo? Added to an existing GLSA. This issue was resolved and addressed in GLSA 201801-14 at https://security.gentoo.org/glsa/201801-14 by GLSA coordinator Thomas Deutschmann (whissi). |