Hardy SRU, xen unified block-device I/O interface back end can orphan devices, CVE-2010-3699
Tim Gardner
tim.gardner at canonical.com
Thu Jan 27 16:43:09 UTC 2011
Here is the patch which I believe addresses the resource
allocation/deallocation issue of concern in CVE-2010-3699. I've attached
the pull request and native patch. Given the nature of Hardy custom
binary patches, I've also attached the flattened patch which is a bit
easier to read. If you're still having problems groking the changes,
then you can prepare a flattened xen tree thusly:
git clone git://kernel.ubuntu.com/rtg/ubuntu-hardy.git
cd ubuntu-hardy
git checkout -b CVE-2010-3699 remotes/origin/CVE-2010-3699
fakeroot debian/rules clean custom-prepare-xen
The flattened tree will be in debian/build/custom-source-xen
I was never able to definitively reproduce the vulnerability. I suspect
it requires environments with more block and network devices than I am
able to reproduce. However, I've instrumented a debug version of this
patch and have verified that all affected code paths have been
exercized. Therefore I believe that I have at least not introduced any
regressions.
rtg
--
Tim Gardner tim.gardner at canonical.com
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: xen.txt
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20110127/954749de/attachment.txt>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 020-xen-CVE-2010-3699.patch
Type: text/x-patch
Size: 4359 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20110127/954749de/attachment.bin>
More information about the kernel-team
mailing list