Hardy SRU, xen unified block-device I/O interface back end can orphan devices, CVE-2010-3699

Tim Gardner tim.gardner at canonical.com
Thu Jan 27 16:43:09 UTC 2011

Here is the patch which I believe addresses the resource 
allocation/deallocation issue of concern in CVE-2010-3699. I've attached 
the pull request and native patch. Given the nature of Hardy custom 
binary patches, I've also attached the flattened patch which is a bit 
easier to read. If you're still having problems groking the changes, 
then you can prepare a flattened xen tree thusly:

git clone git://kernel.ubuntu.com/rtg/ubuntu-hardy.git
cd ubuntu-hardy
git checkout -b CVE-2010-3699 remotes/origin/CVE-2010-3699
fakeroot debian/rules clean custom-prepare-xen

The flattened tree will be in debian/build/custom-source-xen

I was never able to definitively reproduce the vulnerability. I suspect 
it requires environments with more block and network devices than I am 
able to reproduce. However, I've instrumented a debug version of this 
patch and have verified that all affected code paths have been 
exercized. Therefore I believe that I have at least not introduced any 

Tim Gardner tim.gardner at canonical.com
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: xen.txt
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20110127/954749de/attachment.txt>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 020-xen-CVE-2010-3699.patch
Type: text/x-patch
Size: 4359 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20110127/954749de/attachment.bin>

More information about the kernel-team mailing list