|
Message-ID: <4CF487D2.8040008@redhat.com> Date: Tue, 30 Nov 2010 13:12:50 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org>, Marcus Meissner <meissner@...e.de> Subject: CVE request: xen: x86-64: don't crash Xen upon direct pv guest access handle_gdt_ldt_mapping_fault() is intended to deal with indirect accesses (i.e. those caused by descriptor loads) to the GDT/LDT mapping area only. While for 32-bit segment limits indeed prevent the function being entered for direct accesses (i.e. a #GP fault will be raised even before the address translation gets done, on 64-bit even user mode accesses would lead to control reaching the BUG_ON() at the beginning of that function. http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html https://bugzilla.redhat.com/show_bug.cgi?id=658155 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.