Summary: | app-emulation/xen: IO port permissions regression in kernel >= 5.5 (CVE-2020-15852) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ajak, hydrapolic, kernel, proxy-maint, xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.xenproject.org/archives/html/xen-announce/2020-07/msg00001.html | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=731658 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2020-07-25 23:57:26 UTC
Please apply this patch if appropriate: https://lists.xenproject.org/archives/html/xen-announce/2020-07/binjSCTODhPNE.bin ping This is fixed in Linux Kernel in versions 5.5+, nothing to do in Xen. Since we don't have a stable kernel above 5.4, we can just prune kernel <5.7.10. https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.10: commit 3bbf8195e79707268f4fd072d7575ced0207e4ef Author: Andy Lutomirski <luto@kernel.org> Date: Fri Jul 17 16:53:55 2020 -0700 x86/ioperm: Fix io bitmap invalidation on Xen PV commit cadfad870154e14f745ec845708bc17d166065f2 upstream. tss_invalidate_io_bitmap() wasn't wired up properly through the pvop machinery, so the TSS and Xen's io bitmap would get out of sync whenever disabling a valid io bitmap. Add a new pvop for tss_invalidate_io_bitmap() to fix it. This is XSA-329. Fixes: 22fe5b0439dd ("x86/ioperm: Move TSS bitmap update to exit to user work") Signed-off-by: Andy Lutomirski <luto@kernel.org> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Juergen Gross <jgross@suse.com> Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/d53075590e1f91c19f8af705059d3ff99424c020.1595030016.git.luto@kernel.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> (In reply to Tomáš Mózes from comment #3) > This is fixed in Linux Kernel in versions 5.5+, nothing to do in Xen. Since > we don't have a stable kernel above 5.4, we can just prune kernel <5.7.10. Thanks. CCing kernel@. (yes, apologies -- it was a bit late!) Kernel issue so no GLSA; no affected kernels in tree. Closing. |