Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 30 Nov 2010 10:42:37 -0500 (EST)
From: Josh Bressers <>
Cc: "Steven M. Christey" <>,
        Marcus Meissner <>
Subject: Re: CVE request: xen: x86-64: don't crash Xen upon
 direct pv guest access

Please use CVE-2010-4255 for this.



----- "Eugene Teo" <> wrote:

> handle_gdt_ldt_mapping_fault() is intended to deal with indirect 
> accesses (i.e. those caused by descriptor loads) to the GDT/LDT
> mapping 
> area only. While for 32-bit segment limits indeed prevent the function
> being entered for direct accesses (i.e. a #GP fault will be raised
> even 
> before the address translation gets done, on 64-bit even user mode 
> accesses would lead to control reaching the BUG_ON() at the beginning
> of 
> that function.
> Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ