Follow us on Twitter or via RSS feeds with tweets or complete announcement texts or excerpts
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 31 May 2011 15:53:25 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port()
 function

A flaw was found in the way Xen hypervisor checked for upper boundary
when getting a new event channel port. A privileged DomU user could use
this flaws to cause denial of service or, possibly, increase his privileges.

AFAIK, upstream xen is not affected.

https://bugzilla.redhat.com/CVE-2011-1763

fix: xen-unstable c/s 19365:
http://xenbits.xensource.com/hg/xen-unstable.hg/rev/2dcdd2fcb945

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ