public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: CVE-2024-26908: x86/xen: Add some null pointer checking to smp.c
       [not found] <2024041747-CVE-2024-26908-4690@gregkh>
@ 2024-04-29 11:53 ` Juergen Gross
  2024-04-30  8:11   ` Greg KH
  2024-05-27 10:58 ` CVE-2021-47377: kernel: xen/balloon: use a kernel thread instead a workqueue Juergen Gross
  1 sibling, 1 reply; 4+ messages in thread
From: Juergen Gross @ 2024-04-29 11:53 UTC (permalink / raw)
  To: gregkh
  Cc: cve, linux-cve-announce, linux-kernel,
	xen-devel@lists.xenproject.org, Xen.org security team


[-- Attachment #1.1.1: Type: text/plain, Size: 438 bytes --]

Hi,

I'd like to dispute CVE-2024-26908: the issue fixed by upstream commit
3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 can in no way be triggered by
an unprivileged user or by a remote attack of the system, as it requires
hotplug of (virtual) cpus to the running system. This can be done only by
either a host admin or by an admin of the guest which might suffer the
out-of-memory situation.

Please revoke this CVE.


Juergen

[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 3743 bytes --]

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 495 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: CVE-2024-26908: x86/xen: Add some null pointer checking to smp.c
  2024-04-29 11:53 ` CVE-2024-26908: x86/xen: Add some null pointer checking to smp.c Juergen Gross
@ 2024-04-30  8:11   ` Greg KH
  0 siblings, 0 replies; 4+ messages in thread
From: Greg KH @ 2024-04-30  8:11 UTC (permalink / raw)
  To: Juergen Gross
  Cc: cve, linux-cve-announce, linux-kernel,
	xen-devel@lists.xenproject.org, Xen.org security team

On Mon, Apr 29, 2024 at 01:53:44PM +0200, Juergen Gross wrote:
> Hi,
> 
> I'd like to dispute CVE-2024-26908: the issue fixed by upstream commit
> 3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 can in no way be triggered by
> an unprivileged user or by a remote attack of the system, as it requires
> hotplug of (virtual) cpus to the running system. This can be done only by
> either a host admin or by an admin of the guest which might suffer the
> out-of-memory situation.
> 
> Please revoke this CVE.

Sorry for the delay, thanks for looking into this and letting us know.
It's now rejected.

greg k-h

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: CVE-2021-47377: kernel: xen/balloon: use a kernel thread instead a workqueue
       [not found] <2024041747-CVE-2024-26908-4690@gregkh>
  2024-04-29 11:53 ` CVE-2024-26908: x86/xen: Add some null pointer checking to smp.c Juergen Gross
@ 2024-05-27 10:58 ` Juergen Gross
  2024-05-28 19:03   ` Greg KH
  1 sibling, 1 reply; 4+ messages in thread
From: Juergen Gross @ 2024-05-27 10:58 UTC (permalink / raw)
  To: gregkh
  Cc: cve, linux-cve-announce, linux-kernel,
	xen-devel@lists.xenproject.org, Xen.org security team


[-- Attachment #1.1.1: Type: text/plain, Size: 455 bytes --]

Hi,

I'd like to dispute CVE-2021-47377: the issue fixed by upstream commit
8480ed9c2bbd56fc86524998e5f2e3e22f5038f6 can in no way be triggered by
an unprivileged user or by a remote attack of the system, as it requires
initiation of memory ballooning of the running system. This can be done
only by either a host admin or by an admin of the guest which might
suffer the detection of the hanging workqueue.

Please revoke this CVE.


Juergen

[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 3745 bytes --]

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 495 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: CVE-2021-47377: kernel: xen/balloon: use a kernel thread instead a workqueue
  2024-05-27 10:58 ` CVE-2021-47377: kernel: xen/balloon: use a kernel thread instead a workqueue Juergen Gross
@ 2024-05-28 19:03   ` Greg KH
  0 siblings, 0 replies; 4+ messages in thread
From: Greg KH @ 2024-05-28 19:03 UTC (permalink / raw)
  To: Juergen Gross
  Cc: cve, linux-cve-announce, linux-kernel,
	xen-devel@lists.xenproject.org, Xen.org security team

On Mon, May 27, 2024 at 12:58:16PM +0200, Juergen Gross wrote:
> Hi,
> 
> I'd like to dispute CVE-2021-47377: the issue fixed by upstream commit
> 8480ed9c2bbd56fc86524998e5f2e3e22f5038f6 can in no way be triggered by
> an unprivileged user or by a remote attack of the system, as it requires
> initiation of memory ballooning of the running system. This can be done
> only by either a host admin or by an admin of the guest which might
> suffer the detection of the hanging workqueue.
> 
> Please revoke this CVE.

Ah, good catch, this came in as part of the GSD import, and I missed
that this required that type of permissions.  Now revoked, thanks for
the review!

greg k-h

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2024-05-28 19:02 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <2024041747-CVE-2024-26908-4690@gregkh>
2024-04-29 11:53 ` CVE-2024-26908: x86/xen: Add some null pointer checking to smp.c Juergen Gross
2024-04-30  8:11   ` Greg KH
2024-05-27 10:58 ` CVE-2021-47377: kernel: xen/balloon: use a kernel thread instead a workqueue Juergen Gross
2024-05-28 19:03   ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox