[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen Security Advisory 99 - unexpected pitfall in xenaccess API
On Tue, Jun 17, 2014 at 6:36 AM, Ian Campbell <Ian.Campbell@xxxxxxxxxx> wrote:
Correct. So (1) Xen's handling of events won't change (2) the dom0 helper's view will. So the bottomline question is how can a guest inject an event for a dom0 helper which will cause privilege escalation.
Such a helper would be (1) terribly designed (2) unduly powerful.
W^X is enforced by Xen and it won't be swayed by guest ring manipulation. The helper would have been thrown off balance, and failed to audit something at worst. Maybe this means a security problem down the line for that helper toolchain, but outside the purview of the hypervisor.
One path that is not obvious is how would Xen react if the guest corrupts the ring in a way that makes it look full. The intended behavior is for Xen to put the guest vcpu in a wait/queue (or kill the guest). So that the damage at most might be self-DoS.
I see how helpers may be thrown totally off balance. I see self-DoS, but still do not see privilege escalation happening.
Correct, my bad. Thanks AndresÂ
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |