Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 24 Nov 2011 10:57:44 -0700
From: Kurt Seifried <>
Subject: Re: CVE request -- kernel: kvm: device assignment

On 11/24/2011 10:49 AM, Petr Matousek wrote:
> It was found that kvm_vm_ioctl_assign_device function did not check if
> the user requesting assignment was privileged or not. Together with
> /dev/kvm being 666, unprivileged user could assign unused pci devices,
> or even devices that were in use and whose resources were not properly
> claimed by the respective drivers.
> Please note that privileged access was still needed to re-program the
> device to for example issue DMA requests. This is typically achieved by
> touching files on sysfs filesystem. These files are usually not
> accessible to unprivileged users.
> As a result, local user could use this flaw to crash the system.
> Reference:
> Thanks,
Please use CVE-2011-4347 for this issue.


-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ