WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] RE: Paper: Adventures with a certain Xen vulnerability

To: joanna@xxxxxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] RE: Paper: Adventures with a certain Xen vulnerability
From: "Vasiliy Baranov" <vasiliy.baranov@xxxxxxxxx>
Date: Fri, 14 Nov 2008 17:46:28 +0300
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx, rafal@xxxxxxxxxxxxxxxxxxxxxx
Delivery-date: Fri, 14 Nov 2008 06:46:52 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:mime-version:content-type; bh=pJwxA4tBuEVVhrB5yf2k7baOnWRgA313vxw65fZi2Us=; b=a016QTuPBDoJZnz0tSkuFc21BkKFQtFgEoW+NSpPSJNrttuHmCjE/nFQrjl1JVDQBE dnO/HBgTfg9Gjdo6u2nCvLsYA675RkRgz/y0piLdf1R3zyHgaTPdTqyGLryH4bS9C/8J cxUGvhvbpKqOJcjYNoHCs6u9qkQ/pkfzR5QsE=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:mime-version:content-type; b=JjV8mjdyqCl8Mop/pLze1EKr7NArwL9m1GV7lM/aewDehkGkQG0OFTngRR9uqZpHAR ayqmi4LJaxGoLRkxnUmZ5QWlUCrsU2d3tggXwou8FoLmSWQ3CWaa2MDevW9os6erK95b GwVtfO5/7znaP//sHfVMsrxO+3EBh/5P9bEj4=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi Joanna,

I have a question about the exploitability of the issue described in this paper http://invisiblethingslab.com/pub/xenfb-adventures-10.pdf (link found in http://lists.xensource.com/archives/html/xen-devel/2008-10/msg00411.html).

Would exploit be possible if domU were booted with a dom0-supplied kernel (that is, by specifying the kernel in dom0 config rather than via pygrub), which domU would not be able to modify? That is, could the problem be exploited by only playing with domU modules and rebooting the system without modifying the kernel? And what if the dom0-supplied kernel did not allow domU to load any modules?

Asking this as part of a more general discussion taking place here: http://lists.xensource.com/archives/html/xen-users/2008-11/msg00102.html

I have yet to learn a lot about kernels and modules so sorry if my questions do not make any sense.

Thank you in advance,
Vasiliy
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>