[go: up one dir, main page]

oss-sec mailing list archives

Re: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)


From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 24 Dec 2008 11:58:12 -0500 (EST)


======================================================
Name: CVE-2008-5716
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5716
Reference: MLIST:[oss-security] 20081219 CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)
Reference: URL:http://openwall.com/lists/oss-security/2008/12/19/1
Reference: MLIST:[xen-devel] 20081218 PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00842.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00845.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00846.html
Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest
Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00847.html

xend in Xen 3.3.0 does not properly restrict a guest VM's write access
within the /local/domain xenstore directory tree, which allows guest
OS users to cause a denial of service and possibly have unspecified
other impact by writing to (1) console/tty, (2) console/limit, or (3)
image/device-model-pid.  NOTE: this issue exists because of erroneous
set_permissions calls in the fix for CVE-2008-4405.



Current thread: