CVE-2008-1952

Priority
Medium
Description
The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen
ioemu does not properly restrict the frame buffer size, which allows
attackers to cause a denial of service (crash) by mapping an arbitrary
amount of guest memory.
References
Notes
 mdeslaur> this completes CVE-2008-1943
 mdeslaur> first half is xen-pvfb-validate-fb.patch in RHEL5
 mdeslaur> rhel5 is missing the second half
Assigned-to
zul
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Patches:
Upstream:http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00421.html
Upstream:http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00508.html
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Patches:
Upstream:http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00421.html
Upstream:http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00508.html
Package
Upstream:not-affected
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):not-affected
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:32:34 UTC (commit 9756)