Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 17 Mar 2011 08:09:33 +0100
From: Ludwig Nussel <ludwig.nussel@...e.de>
To: oss-security@...ts.openwall.com
Cc: Lars Kurth <lars.kurth@....org>
Subject: CVE Request: xen DoS

Hi,

http://xenbits.xen.org/hg/staging/xen-unstable.hg/rev/c79aae866ad8

Citing https://bugzilla.novell.com/show_bug.cgi?id=679344:
"The problem is that a 64-bit guest can get one of its vcpus into
non-kernel mode without first providing a valid non-kernel pagetable.
The iret-into-userspace path has the right checks, but just setting the
context on a fresh vcpu doesn't. :(  The observed failure mode is
usually a hard lockup of the host."

cu
Ludwig

-- 
 (o_   Ludwig Nussel
 //\
 V_/_  http://www.suse.de/
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.