[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 08/24] xsplice: Add helper elf routines
Konrad Rzeszutek Wilk writes ("[PATCH v6 08/24] xsplice: Add helper elf routines"): > From: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> > > Add Elf routines and data structures in preparation for loading an > xSplice payload. > > We make an assumption that the max number of sections an ELF payload > can have is 64. We can in future make this be dependent on the > names of the sections and verifying against a list, but for right now > this suffices. > > Also we a whole lot of checks to make sure that the ELF payload > file is not corrupted nor that the offsets point past the file. This is good, but: ideally I would like to avoid conducting a detailed security review of this code. My understanding of this is that the purpose of this machinery is to supply binary runtime patches to the hypervisor. So I think someone who can inject malicious xsplice payloads can already control the host. Is that right ? If so then bugs in this loader cannot be any security impact. It might be worth mentioning somewhere that this loader must not be used for xsplice payloads for guest kernels. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |