Bug 1166261 - XSA-113 - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
Summary: XSA-113 - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
Keywords:
Status: CLOSED DUPLICATE of bug 1166914
Alias: None
Product: Fedora
Classification: Fedora
Component: xen
Version: rawhide
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Michael Young
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-11-20 16:44 UTC by Major Hayden 🤠
Modified: 2014-11-22 11:40 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-11-22 11:40:43 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Major Hayden 🤠 2014-11-20 16:44:22 UTC
The Xen community accidentally dropped XSA 113 into the xen-devel list and skipped the embargo process:

http://lists.xen.org/archives/html/xen-devel/2014-11/msg01937.html

It looks like the worst impact would be a hypervisor crash.

Comment 1 Fedora Update System 2014-11-20 21:40:34 UTC
xen-4.4.1-8.fc21 has been submitted as an update for Fedora 21.
https://admin.fedoraproject.org/updates/xen-4.4.1-8.fc21

Comment 2 Fedora Update System 2014-11-20 22:41:42 UTC
xen-4.3.3-5.fc20 has been submitted as an update for Fedora 20.
https://admin.fedoraproject.org/updates/xen-4.3.3-5.fc20

Comment 3 Fedora Update System 2014-11-20 23:33:39 UTC
xen-4.2.5-5.fc19 has been submitted as an update for Fedora 19.
https://admin.fedoraproject.org/updates/xen-4.2.5-5.fc19

Comment 4 Michael Young 2014-11-22 11:40:43 UTC
Duplicate of official security bug 1166914

*** This bug has been marked as a duplicate of bug 1166914 ***


Note You need to log in before you can comment on or make changes to this bug.