A weakness has been reported in Xen, which can be exploited by malicious, local users in a Xen DomU to bypass certain security restrictions.
The weakness is caused due to certain XenStore variables (e.g. /local/domain/<domid>/console/tty and /local/domain/<domid>/console/vnc-port) being writable from within the corresponding Xen DomU domain. This can be exploited to overwrite the variables, which may be processed with potentially unsafe values in applications running in Dom0.
Solution: Fixed in the Mercurial repository.
Provided and/or discovered by: Pascal Bouchareine
Original Advisory: http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org