Bug 32766 - xen: Multiple issues (3.1)
xen: Multiple issues (3.1)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P4 normal (vote)
: UCS 3.1-x-errata
Assigned To: Security maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2013-10-01 07:25 CEST by Moritz Muehlenhoff
Modified: 2019-04-11 19:24 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2013-10-01 07:25:26 CEST
Information leak in I/O code for HVM guests (CVE-2013-4355, CVE-2013-4361)

Information leak with some CPU types if XSAVE is used (CVE-2013-1442)
Comment 1 Moritz Muehlenhoff univentionstaff 2013-10-16 08:43:30 CEST
Resource leak in qdisk (CVE-2013-4375) (UCS 2.4 is not affected)

qemu-kvm is not affected, specific to Xen.
Comment 2 Moritz Muehlenhoff univentionstaff 2013-11-08 14:03:42 CET
Denial of service through enforced deadlocks (CVE-2013-4494)
Comment 3 Moritz Muehlenhoff univentionstaff 2013-11-27 08:03:57 CET
Denial of service through incorrect locking (CVE-2013-4553)
Incorrect validation of hypercall privileges (CVE-2013-4554)
Comment 4 Moritz Muehlenhoff univentionstaff 2014-02-13 11:26:20 CET
use-after-free in xc_cpupool_getinfo() (CVE-2014-1950)
Comment 5 Moritz Muehlenhoff univentionstaff 2014-03-26 13:11:54 CET
Denial of service in HVMOP_set_mem_access() (CVE-2014-2599)
Comment 6 Moritz Muehlenhoff univentionstaff 2014-05-02 08:44:44 CEST
Denial of service in HVMOP_set_mem_type() (CVE-2014-3124)
Comment 7 Moritz Muehlenhoff univentionstaff 2014-06-02 07:59:18 CEST
The maintenance with bug and security fixes for UCS 3.1-x has ended on 31st of May 2014.

The maintenance of the UCS 3.x major series is continued by UCS 3.2-x that is supplied with bug and security fixes.

Customers still on UCS 3.1-x are encouraged to update to UCS 3.2. Please contact your partner or Univention for any questions.