[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-12-24 16:58:12
Message-ID: Pine.GSO.4.51.0812241157590.12707 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2008-5716
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5716
Reference: MLIST:[oss-security] 20081219 CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)
Reference: URL:http://openwall.com/lists/oss-security/2008/12/19/1
Reference: MLIST:[xen-devel] 20081218 PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00842.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00845.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00846.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00847.html

xend in Xen 3.3.0 does not properly restrict a guest VM's write access
within the /local/domain xenstore directory tree, which allows guest
OS users to cause a denial of service and possibly have unspecified
other impact by writing to (1) console/tty, (2) console/limit, or (3)
image/device-model-pid.  NOTE: this issue exists because of erroneous
set_permissions calls in the fix for CVE-2008-4405.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic