Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 23 Jun 2008 14:41:31 -0400 (EDT)
From: "Steven M. Christey" <>
To: Nico Golde <>
        "Steven M. Christey" <>
Subject: Re: New Xen ioemu: PVFB backend issue

On Thu, 19 Jun 2008, Nico Golde wrote:

> Can you take care about the remaining steps to get this on
> the mitre site or Steve could you update this? Quite some
> time passed since this was assigned :)

There was enough in the initial post, I just missed it the first time

Any idea on affected Xen versions?

- Steve

Name: CVE-2008-1952
Status: Candidate
Reference: MLIST:[Xen-devel] 20080521 [PATCH] ioemu: Fix PVFB backend to limit frame buffer size
Reference: URL:
Reference: MLIST:[oss-security] 20080521 New Xen ioemu: PVFB backend issue
Reference: URL:
Reference: CONFIRM:

The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in
Xen ioemu does not properly restrict the frame buffer size, which
allows attackers to cause a denial of service (crash) by mapping an
arbitrary amoount of guest memory.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.