oss-sec mailing list archives
Re: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)
From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 24 Dec 2008 11:58:12 -0500 (EST)
====================================================== Name: CVE-2008-5716 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5716 Reference: MLIST:[oss-security] 20081219 CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete) Reference: URL:http://openwall.com/lists/oss-security/2008/12/19/1 Reference: MLIST:[xen-devel] 20081218 PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00842.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00845.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00846.html Reference: MLIST:[xen-devel] 20081218 Re: PATCH: Actually make /local/domain/$DOMID readonly to the guest Reference: URL:http://lists.xensource.com/archives/html/xen-devel/2008-12/msg00847.html xend in Xen 3.3.0 does not properly restrict a guest VM's write access within the /local/domain xenstore directory tree, which allows guest OS users to cause a denial of service and possibly have unspecified other impact by writing to (1) console/tty, (2) console/limit, or (3) image/device-model-pid. NOTE: this issue exists because of erroneous set_permissions calls in the fix for CVE-2008-4405.
Current thread:
- CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete) Jan Lieskovsky (Dec 19)
- Re: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete) Steven M. Christey (Dec 24)