Bug 1196266 (CVE-2015-2150, CVE-2015-8553, xsa120)
Summary: | CVE-2015-2150 CVE-2015-8553 xen: non-maskable interrupts triggerable by guests (xsa120) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> | ||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
Status: | CLOSED WONTFIX | QA Contact: | |||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | medium | ||||||||||
Version: | unspecified | CC: | carnil, drjones, imammedo, mrezanin, pbonzini, pmatouse, rkrcmar, security-response-team, vkuznets | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2015-02-26 13:43:36 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | 1200397, 1292439 | ||||||||||
Bug Blocks: | 1196269 | ||||||||||
Attachments: |
|
Description
Vasyl Kaigorodov
2015-02-25 15:39:37 UTC
Created attachment 995253 [details]
xsa120.patch
Statement: This issue does affect the Dom0 Xen kernel as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. External References: http://xenbits.xen.org/xsa/advisory-120.html Created xen tracking bugs for this issue: Affects: fedora-all [bug 1200397] An update on this issue from Xen: The original patches were incomplete: although they eliminated the possibility that the guest might disable memory and I/O decoding, they did not ensure that these bits were set at start of day. The result was that a malicious guest could simply avoid enabling them and continue to exploit the vulnerability. Well behaved guests would normally enable decoding and therefore would not normally suffer a regression. Additional patches are now supplied to resolve this issue. Created attachment 1009512 [details]
xsa120-addendum.patch
Created attachment 1009513 [details]
xsa120-classic-addendum.patch
A second CVE has been assigned to this issue per: http://xenbits.xen.org/xsa/advisory-157.html From the updated XSA-120: "UPDATES IN VERSION 5 ==================== The original patches were incomplete: although they eliminated the possibility that the guest might disable memory and I/O decoding, they did not ensure that these bits were set at start of day. The result was that a malicious guest could simply avoid enabling them and continue to exploit the vulnerability. Well behaved guests would normally enable decoding and therefore would not normally suffer a regression. Additional patches are now supplied to resolve this issue." Created xen tracking bugs for this issue: Affects: fedora-all [bug 1292439] |