Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4D81EB8F.50605@redhat.com>
Date: Thu, 17 Mar 2011 19:07:59 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Ludwig Nussel <ludwig.nussel@...e.de>, Lars Kurth <lars.kurth@....org>
Subject: Re: CVE Request: xen DoS

On 03/17/2011 03:09 PM, Ludwig Nussel wrote:
> Hi,
>
> http://xenbits.xen.org/hg/staging/xen-unstable.hg/rev/c79aae866ad8
>
> Citing https://bugzilla.novell.com/show_bug.cgi?id=679344:
> "The problem is that a 64-bit guest can get one of its vcpus into
> non-kernel mode without first providing a valid non-kernel pagetable.
> The iret-into-userspace path has the right checks, but just setting the
> context on a fresh vcpu doesn't. :(  The observed failure mode is
> usually a hard lockup of the host."

Please use CVE-2011-1166.

Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.