|
Message-ID: <Pine.GSO.4.51.0812241157590.12707@faron.mitre.org> Date: Wed, 24 Dec 2008 11:58:12 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: "Steven M. Christey" <coley@...re.org> Subject: Re: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete) ====================================================== Name: CVE-2008-5716 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5716 Reference: MLIST:[oss-security] 20081219 CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete) Reference: URL:http://openwall.com/lists/oss-security/2008/12/19/1 Reference: MLIST:[xen-devel] 20081218 PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00842.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00845.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00846.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00847.html xend in Xen 3.3.0 does not properly restrict a guest VM's write access within the /local/domain xenstore directory tree, which allows guest OS users to cause a denial of service and possibly have unspecified other impact by writing to (1) console/tty, (2) console/limit, or (3) image/device-model-pid. NOTE: this issue exists because of erroneous set_permissions calls in the fix for CVE-2008-4405.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.