Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.Referenceshttp://theinvisiblethings.blogspot.com/2008/08/our-xen-0wning-trilogy-highlights.htmlhttp://www.securityfocus.com/bid/30834http://www.nabble.com/-PATCH--XSM--FLASK--Argument-handling-bugs-in-XSM:FLASK-to18536032.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/44608http://secunia.com/advisories/31561http://xenbits.xensource.com/xen-3.3-testing.hg?rev/fa66b33f975ahttp://invisiblethingslab.com/bh08/part2.pdfhttp://www.vupen.com/english/advisories/2008/2426http://www.securitytracker.com/id?1020731