[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] QEMU "drive_init()" Disk Format Security Bypass


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Eren TÃrkay <turkay.eren@xxxxxxxxx>
  • Date: Thu, 8 May 2008 18:00:24 +0300
  • Delivery-date: Thu, 08 May 2008 08:01:08 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=from:to:subject:date:user-agent:mime-version:content-type:content-transfer-encoding:content-disposition:message-id; b=cXMJyvGrjbMjfO/ssSGkmHASkdXDBfJNrrLjnGG9M9zccEYKklXB4mA5YCq5ViTvW9mChRiB8YaF9MY5n6L3rZ6yGEyEaQkAefOi9gsYNJEoLaWevlNUcYCMeL1PiZugPqt3Ig2wj7BkZMFL9p1vy3xU1oA0RER4/m8512s9iqs=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hello,

Today, a security flaw in Qemu was released at secunia [0] which was fixed in 
qemu svn repository.

Xen uses part of a qemu code including "vl.c" in which the security flaw 
appeared. I suspect that Xen is effected by this vulnerability too but I 
couldn't find same lines in vl.c and I'm not sure about it.

Could someone look at this issue and shed a light? If Xen is effected, I would 
really appreciate a patch.

[0] http://secunia.com/advisories/30111/

My best regards,
Eren

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.