CVE-2008-3687
Published: 14 August 2008
Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(not compiled with XSM:FLASK)
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
hardy |
Does not exist
|
|
upstream |
Needs triage
|
|
xen-3.0 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
feisty |
Not vulnerable
(not compiled with XSM:FLASK)
|
|
gutsy |
Does not exist
|
|
hardy |
Does not exist
|
|
upstream |
Needs triage
|
|
xen-3.1 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
feisty |
Does not exist
|
|
gutsy |
Not vulnerable
(not compiled with XSM:FLASK)
|
|
hardy |
Not vulnerable
(not compiled with XSM:FLASK)
|
|
upstream |
Needs triage
|
|
xen-3.2 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
hardy |
Not vulnerable
(not compiled with XSM:FLASK)
|
|
upstream |
Needs triage
|