Henri Salo
2013-Nov-23 09:41 UTC
[Pkg-xen-devel] Bug#730254: xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code
Package: xen Version: 4.0.1-5.11 Severity: important Tags: security, patch, fixed-upstream http://www.openwall.com/lists/oss-security/2013/11/21/2 Description: An inverted boolean parameter resulted in TLB flushes not happening upon clearing of a present translation table entry. Retaining stale TLB entries could allow guests access to memory that ought to have been revoked, or grant greater access than intended. Impact: Malicious guest administrators might be able to cause host-wide denial of service, or escalate their privilege to that of the host. Patch attached. Please patch this security vulnerability, thanks. -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.11-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash -------------- next part -------------- A non-text attachment was scrubbed... Name: xsa78.patch Type: text/x-diff Size: 888 bytes Desc: not available URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20131123/05f79b54/attachment.patch> -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 198 bytes Desc: Digital signature URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20131123/05f79b54/attachment.sig>
Debian Bug Tracking System
2014-Aug-10 12:03 UTC
[Pkg-xen-devel] Bug#730254: marked as done (xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code)
Your message dated Sun, 10 Aug 2014 12:00:17 +0000 with message-id <E1XGRnN-0007aw-7x at franck.debian.org> and subject line Bug#730254: fixed in xen 4.4.0-1 has caused the Debian Bug report #730254, regarding xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 730254: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730254 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Henri Salo <henri at nerv.fi> Subject: xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code Date: Sat, 23 Nov 2013 11:41:29 +0200 Size: 4754 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20140810/6ec2249f/attachment-0002.mht> -------------- next part -------------- An embedded message was scrubbed... From: Bastian Blank <waldi at debian.org> Subject: Bug#730254: fixed in xen 4.4.0-1 Date: Sun, 10 Aug 2014 12:00:17 +0000 Size: 9103 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20140810/6ec2249f/attachment-0003.mht>
Apparently Analagous Threads
- xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code
- Bug#705659: Xen scripts use old-skool "ip" command syntax
- Bug#744160: xl.conf ambiguity
- Bug#697407: xen-utils-4.1: pygrub doesn't find extlinux.conf in default Debian location
- Bug#697409: xen-utils-4.1: pygrub does not correctly distinguish between "disk with partitions" and "partition"