Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 30 Nov 2010 10:42:37 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>,
        Marcus Meissner <meissner@...e.de>
Subject: Re: CVE request: xen: x86-64: don't crash Xen upon
 direct pv guest access

Please use CVE-2010-4255 for this.

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> handle_gdt_ldt_mapping_fault() is intended to deal with indirect 
> accesses (i.e. those caused by descriptor loads) to the GDT/LDT
> mapping 
> area only. While for 32-bit segment limits indeed prevent the function
> 
> being entered for direct accesses (i.e. a #GP fault will be raised
> even 
> before the address translation gets done, on 64-bit even user mode 
> accesses would lead to control reaching the BUG_ON() at the beginning
> of 
> that function.
> 
> http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
> https://bugzilla.redhat.com/show_bug.cgi?id=658155
> 
> Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ