Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 25 Mar 2014 10:35:44 +0000
From: Ian Campbell <>
To: <>
CC: <>, <>
Subject: Re: Xen Security Advisory 90 - Linux netback crash trying to
 disable due to malformed packet

On Mon, 2014-03-24 at 15:47 -0400, wrote:
> > XSA-90
> > it tries to disable the interface ... This involves taking a mutex ...
> > sleeping is not allowed ... The end result is that the backend domain
> > (often, Dom0) crashes with "scheduling while atomic". Malicious guest
> > administrators can cause denial of service.
> Use CVE-2014-2580.


> > This bug was publicly reported on xen-devel, before it was appreciated
> > that there was a security problem. The public mailing list thread
> > nevertheless contains information strongly suggestive of a security
> > bug, and a different security bug (with CVE) is suggested as seeming
> > "similar".
> We didn't happen to notice a CVE ID of a similar bug within xen-devel.

The first mail in the thread (<>) had a link to which was a
bug relating to CVE-2013-0216.

> In some cases, we would use that bug's CVE ID (if available) within a
> "NOTE:" sentence at the end of a new vulnerability's CVE description.
> says "by removing these checks we are introducing a way for a
> malicious or buggy guest to trigger misbehaviour in the backend,
> leading to e.g. a DoS" but we haven't tried to track down whether that
> is directly applicable.

This was review of a separate patch unrelated to the bug in question.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ