Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Apr 2014 16:18:45 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 92 - HVMOP_set_mem_type allows invalid P2M entries to be created

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> XSA-92

> attempts to exclude transitioning a page from an inappropriate memory
> type. However, only an inadequate subset of memory types is excluded.
> ... page table translation can be inappropriately changed ... If this
> occurs, an invalid translation will be established.
> 
> In the more general case, in more abstract terms: a malicious
> administrator of a domain privileged with regard to an HVM guest can
> cause Xen to crash
> 
> the extra isolation does not provide as good a defence (against denial
> of service) as intended. That is the essence of this vulnerability.

Use CVE-2014-3124.

> the chroot technique as found in some versions of XCP/XenServer

Our expectation is that the specific version set for these XCP and
XenServer versions does not mean that there are different attacks
possible (e.g., with different "inappropriate memory types") against
different affected versions.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTYVosAAoJEKllVAevmvmsDOcIAMcUfaX0Uo31VFN5VlLrlhLl
eonm4ci4VGIW4PSvxiaAmqJvZn7Ab7nvhRRGhoFkKOsSYVepbA28gZ7wVkBn04cZ
Jx5zN3Zaia6zuMy/UFO3HjzR25k8yWm9KlzBrY4P5ynP6TnYbzoM8IpQd3FMyjxb
2TlB4WTI28ilcLK0jTSpxsOUyIsRNeKQicUFMKJNVv+l/sRKLVStYbMlWJ+h6i5x
5jpjIcCrd03oyEfzH1E81aHx1zsGkRTl4WXqUjyWYKkV02c5j/j+Dvn/Axody7Ri
QjE1cNQfG/gkwKSq/b7I4H/0wFnVMM7BBuvcXYJkYU2i6IhZ1R3iZVYrNZzKcKY=
=CjnC
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.