Bug 1284911 (CVE-2015-8338, xsa158)
Summary: | CVE-2015-8338 xen: Long running memory operations on ARM cause DoS | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED NOTABUG | QA Contact: | |||||||
Severity: | high | Docs Contact: | |||||||
Priority: | high | ||||||||
Version: | unspecified | CC: | agordeev, ailan, aquini, bhu, blc, dhoward, drjones, esammons, fhrbata, hkrzesin, hwkernel-mgr, iboverma, imammedo, jkacur, jross, kernel-mgr, knoel, lgoncalv, lwang, matt, mcressma, mguzik, mlangsdo, mrezanin, nmurray, osoukup, pbonzini, plougher, rkrcmar, rt-maint, rvrbovsk, security-response-team, vkuznets, williams, xen-maint | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: |
A flaw was discovered in xen host that prevented the use of a physical CPU for a significant period of time. This can cause a softlockup or watchdog timeout in both the host and other guests.
|
Story Points: | --- | ||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2017-10-19 09:52:16 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 1289568 | ||||||||
Bug Blocks: | 1284949 | ||||||||
Attachments: |
|
Description
Adam Mariš
2015-11-24 12:59:14 UTC
Created attachment 1098193 [details]
xen-unstable, Xen 4.6.x, Xen 4.5.x
Created attachment 1098194 [details]
Xen 4.4.x, Xen 4.3.x
External References: http://xenbits.xen.org/xsa/advisory-158.html Created xen tracking bugs for this issue: Affects: fedora-all [bug 1289568] Just added to the upstream advisory: UPDATES IN VERSION 4 ==================== Mention that the original patches had two problems, supplying an incremental patch. xen-4.5.2-5.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. xen-4.5.2-5.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, Red Hat Enterprise MRG 2, and realtime kernels. At the time of writing, XEN on Red Hat Enterprise Linux 5 did not support ARM guests. XEN was not available on versions Red Hat Enterprise Linux 6 and 7, Red Hat Enterprise MRG 2, and realtime kernels. |