xen: CVE-2016-9386: x86 null segments not always treated as unusable

Debian Bug report logs - #845663
xen: CVE-2016-9386: x86 null segments not always treated as unusable

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 25 Nov 2016 18:39:01 UTC

Severity: important

Tags: patch, security, upstream

Found in versions xen/4.4.1-9, xen/4.4.1-6, xen/4.8.0~rc5-1

Fixed in versions xen/4.8.0-1, xen/4.4.1-9+deb8u8

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>:
Bug#845663; Package src:xen. (Fri, 25 Nov 2016 18:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>. (Fri, 25 Nov 2016 18:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: xen: CVE-2016-9386: x86 null segments not always treated as unusable
Date: Fri, 25 Nov 2016 19:35:18 +0100
Source: xen
Version: 4.4.1-9
Severity: important
Tags: security upstream patch

Hi,

the following vulnerability was published for xen.

CVE-2016-9386[0]:
x86 null segments not always treated as unusable

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9386
[1] https://xenbits.xen.org/xsa/advisory-191.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as found in versions xen/4.4.1-6. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 25 Nov 2016 19:06:11 GMT) (full text, mbox, link).


Marked as found in versions xen/4.8.0~rc5-1. Request was from Bastian Blank <waldi@debian.org> to control@bugs.debian.org. (Sun, 27 Nov 2016 11:27:04 GMT) (full text, mbox, link).


Merged 845663 845664 845665 845667 845668 845669 845670 Request was from Bastian Blank <waldi@debian.org> to control@bugs.debian.org. (Sun, 27 Nov 2016 11:27:12 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:04 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:04 GMT) (full text, mbox, link).


Message #16 received at 845663-done@bugs.debian.org (full text, mbox, reply):

From: Bastian Blank <waldi@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 845663-done@bugs.debian.org
Subject: Re: [Pkg-xen-devel] Bug#845663: xen: CVE-2016-9386: x86 null segments not always treated as unusable
Date: Sun, 27 Nov 2016 12:28:04 +0100
Hi Salvatore

On Fri, Nov 25, 2016 at 07:35:18PM +0100, Salvatore Bonaccorso wrote:
> Source: xen
> Version: 4.4.1-9

Security bugs in stable are handled by the security team.  There is no
need to write bugs.  I'm closing them.

Regards,
Bastian

-- 
Vulcans never bluff.
		-- Spock, "The Doomsday Machine", stardate 4202.1



Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:05 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:05 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:06 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:06 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:07 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:07 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:07 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:07 GMT) (full text, mbox, link).


Reply sent to Bastian Blank <waldi@debian.org>:
You have taken responsibility. (Sun, 27 Nov 2016 11:30:08 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 27 Nov 2016 11:30:08 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>:
Bug#845663; Package src:xen. (Tue, 29 Nov 2016 14:51:03 GMT) (full text, mbox, link).


Acknowledgement sent to Julien Cristau <jcristau@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>. (Tue, 29 Nov 2016 14:51:03 GMT) (full text, mbox, link).


Message #45 received at 845663@bugs.debian.org (full text, mbox, reply):

From: Julien Cristau <jcristau@debian.org>
To: Bastian Blank <waldi@debian.org>
Cc: Salvatore Bonaccorso <carnil@debian.org>, 845663@bugs.debian.org
Subject: Re: [Pkg-xen-devel] Bug#845663: xen: CVE-2016-9386: x86 null segments not always treated as unusable
Date: Tue, 29 Nov 2016 15:49:04 +0100
Control: reopen -1

On Sun, Nov 27, 2016 at 12:28:04PM +0100, Bastian Blank wrote:
> Hi Salvatore
> 
> On Fri, Nov 25, 2016 at 07:35:18PM +0100, Salvatore Bonaccorso wrote:
> > Source: xen
> > Version: 4.4.1-9
> 
> Security bugs in stable are handled by the security team.  There is no
> need to write bugs.  I'm closing them.
> 
Bastian,

the above is just not true.  Security bugs in stable should be handled
by the maintainer, with the security team acting as a support and
backup.  And once issues are public, filing bugs is very much
appropriate.  Finally, if these bugs still affect unstable, they should
be handled there by the maintainer as well, or if they are already fixed
there, they can be closed with the corresponding version tracking
information, not just summarily closed.

Cheers,
Julien




Bug reopened Request was from Julien Cristau <jcristau@debian.org> to 845663-submit@bugs.debian.org. (Tue, 29 Nov 2016 14:51:03 GMT) (full text, mbox, link).


Disconnected #845670 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:03 GMT) (full text, mbox, link).


Disconnected #845669 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:07 GMT) (full text, mbox, link).


Disconnected #845668 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:10 GMT) (full text, mbox, link).


Disconnected #845667 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:13 GMT) (full text, mbox, link).


Disconnected #845665 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:15 GMT) (full text, mbox, link).


Disconnected #845664 from all other report(s). Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 01 Dec 2016 19:45:17 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 03 Dec 2016 13:42:06 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Wed, 14 Dec 2016 21:06:13 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Wed, 14 Dec 2016 21:06:13 GMT) (full text, mbox, link).


Message #66 received at 845663-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 845663-close@bugs.debian.org
Subject: Bug#845663: fixed in xen 4.4.1-9+deb8u8
Date: Wed, 14 Dec 2016 21:04:14 +0000
Source: xen
Source-Version: 4.4.1-9+deb8u8

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 845663@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 03 Dec 2016 12:12:53 +0100
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture: all source
Version: 4.4.1-9+deb8u8
Distribution: jessie-security
Urgency: high
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 845663 845664 845665 845668 845670
Description: 
 libxen-4.4 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.4-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.4-arm64 - Xen Hypervisor on ARM64
 xen-hypervisor-4.4-armhf - Xen Hypervisor on ARMHF
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-arm64 - Xen System on ARM64 (meta-package)
 xen-system-armhf - Xen System on ARMHF (meta-package)
 xen-utils-4.4 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Changes:
 xen (4.4.1-9+deb8u8) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2016-7777: CR0.TS and CR0.EM not always honored for x86 HVM guests
   * CVE-2016-9386: x86 null segments not always treated as unusable
     (Closes: #845663)
   * CVE-2016-9382: x86 task switch to VM86 mode mis-handled (Closes: #845664)
   * CVE-2016-9385: x86 segment base write emulation lacking canonical address
     checks (Closes: #845665)
   * CVE-2016-9383: x86 64-bit bit test instruction emulation broken
     (Closes: #845668)
   * CVE-2016-9379, CVE-2016-9380: delimiter injection vulnerabilities in
     pygrub (Closes: #845670)
Checksums-Sha1: 
 941848efaef9535a44f3d9664872cf209c192475 3146 xen_4.4.1-9+deb8u8.dsc
 897ea88ea02277175b82eadf820052e36cfb1cec 113128 xen_4.4.1-9+deb8u8.debian.tar.xz
 fbe86caf6a9891337e997e265d4370f12a6feb54 122284 xen-utils-common_4.4.1-9+deb8u8_all.deb
Checksums-Sha256: 
 8eaf73760c8dd762473d5e2cbb246ff846613a2d2c9ceffbb77d96e3a2772dc5 3146 xen_4.4.1-9+deb8u8.dsc
 f4bf2a68dc78ca97014d8d9f84e5d36f207b5ef768f20ca64edec66391314d6a 113128 xen_4.4.1-9+deb8u8.debian.tar.xz
 e353abb1fefb34341c05b4207039ce17ec90c8ed9d1686bb27c28e96655cb324 122284 xen-utils-common_4.4.1-9+deb8u8_all.deb
Files: 
 5135e1cce01b695a03e5ea33c24137f1 3146 kernel optional xen_4.4.1-9+deb8u8.dsc
 57fd28112c771a337dd0db14ca49af9d 113128 kernel optional xen_4.4.1-9+deb8u8.debian.tar.xz
 e6a197e146b03fc5439b102360634326 122284 kernel optional xen-utils-common_4.4.1-9+deb8u8_all.deb

-----BEGIN PGP SIGNATURE-----
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=0oOm
-----END PGP SIGNATURE-----




Marked as fixed in versions xen/4.8.0-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 22 Dec 2016 19:33:13 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#845663. (Thu, 22 Dec 2016 19:33:17 GMT) (full text, mbox, link).


Message #71 received at 845663-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 845663-submitter@bugs.debian.org
Subject: closing 845663
Date: Thu, 22 Dec 2016 20:30:24 +0100
close 845663 4.8.0-1
thanks




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 30 Jan 2017 07:36:34 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 19:17:02 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.