Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 30 Nov 2010 13:12:50 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>,
        Marcus Meissner <>
Subject: CVE request: xen: x86-64: don't crash Xen upon direct pv guest access

handle_gdt_ldt_mapping_fault() is intended to deal with indirect 
accesses (i.e. those caused by descriptor loads) to the GDT/LDT mapping 
area only. While for 32-bit segment limits indeed prevent the function 
being entered for direct accesses (i.e. a #GP fault will be raised even 
before the address translation gets done, on 64-bit even user mode 
accesses would lead to control reaching the BUG_ON() at the beginning of 
that function.

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ