|
Message-ID: <4DE49E75.60007@redhat.com> Date: Tue, 31 May 2011 15:53:25 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function A flaw was found in the way Xen hypervisor checked for upper boundary when getting a new event channel port. A privileged DomU user could use this flaws to cause denial of service or, possibly, increase his privileges. AFAIK, upstream xen is not affected. https://bugzilla.redhat.com/CVE-2011-1763 fix: xen-unstable c/s 19365: http://xenbits.xensource.com/hg/xen-unstable.hg/rev/2dcdd2fcb945 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.