[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2010-3699 xen: guest->host denial of service from invalid xenbus
From:       Eugene Teo <eugene () redhat ! com>
Date:       2010-11-25 5:40:46
Message-ID: 4CEDF6DE.4080607 () redhat ! com
[Download RAW message or body]

A guest can cause the backend driver to leak a kernel thread. Such 
leaked threads hold references to the device, which makes the device 
impossible to tear down. If shut down, the guest remains a zombie 
domain, the xenwatch process hangs, and most xm commands will stop working.

Upstream commit:
http://xenbits.xen.org/linux-2.6.18-xen.hg?rev/59f097ef181b

Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=636411

Thanks, Eugene
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic