Summary: | <app-emulation/xen-{4.10.2-r1,4.11.0-r3}: multiple vulnerabilities (XSA-{278,282}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | hydrapolic, xen |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
app-emulation/xen-pvgrub-4.10.2 amd64 x86
app-emulation/xen-tools-4.10.2-r1 amd64 x86
app-emulation/xen-4.10.2-r1 amd64
|
Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2018-11-10 21:23:12 UTC
amd64 stable x86 stable Please also stabilize app-emulation/xen-pvgrub on amd64, x86, thanks. amd64 stable XSA-282 - Awaiting CVE https://xenbits.xen.org/xsa/advisory-282.html x86 stable (In reply to Yury German from comment #5) >XSA-282 - Awaiting CVE CVE CVE-2017-17044 assigned. Xen Security Advisory XSA-282 guest use of HLE constructs may lock up host ISSUE DESCRIPTION ================= Various Intel CPU models have an erratum listed under the title "Processor May Hang When Executing Code In an HLE Transaction". It describes a potential hang when using instructions with the XACQUIRE prefix on the host physical memory range covering the first 4 MiB starting at the 1GiB boundary. IMPACT ====== A malicious or buggy guest may cause a CPU to hang, resulting in a DoS (Denial of Service) affecting the entire host. VULNERABLE SYSTEMS ================== All Xen versions are affected. Only Intel based x86 systems are affected. Please refer to Intel documentation as to which specific CPU models are affected. AMD x86 systems as well as Arm ones are not affected. MITIGATION ========== There is no known mitigation. A BIOS update may be available for some systems, working around the issue at the firmware level. RESOLUTION ========== Applying the appropriate pair of attached patches works around this issue for the CPU models known to be affected at the time of writing. xsa282-?.patch xen-unstable xsa282-4.11-1.patch + xsa282-2.patch Xen 4.11.x, Xen 4.10.x xsa282-4.9-1.patch + xsa282-2.patch Xen 4.9.x xsa282-4.9-1.patch + xsa282-4.8-2.patch Xen 4.8.x, Xen 4.7.x |