[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 31 May 2011 15:53:25 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port()
function
A flaw was found in the way Xen hypervisor checked for upper boundary
when getting a new event channel port. A privileged DomU user could use
this flaws to cause denial of service or, possibly, increase his privileges.
AFAIK, upstream xen is not affected.
https://bugzilla.redhat.com/CVE-2011-1763
fix: xen-unstable c/s 19365:
http://xenbits.xensource.com/hg/xen-unstable.hg/rev/2dcdd2fcb945
Thanks, Eugene
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ