[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Xen Security Advisory 99 - unexpected pitfall in xenaccess API
-----BEGIN PGP SIGNED MESSAGE----- How? I've looked at the patch. It's the refactor proposed in a separate thread by Dushyant Behl, lifted up a level. Obviously useful, +2.
But fundamentally, how is this a vulnerability? Since the dawn of time guests can poke at the qemu and PV frontend rings. So self DoS, check. But, privilege escalation? Is this predicated on the potential (lack of) software quality of the xenaccess backends? That's a fair argument, but a different story.
I am puzzled how this is an XSA that addresses "privilege escalation". Thanks Andres
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |