Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.00.1301222106280.32543@procyon.dur.ac.uk>
Date: Tue, 22 Jan 2013 21:09:29 +0000 (GMT)
From: M A Young <m.a.young@...ham.ac.uk>
To: "Xen.org security team" <security@....org>
cc: xen-announce@...ts.xen.org, xen-devel@...ts.xen.org,
        xen-users@...ts.xen.org, oss-security@...ts.openwall.com
Subject: Re: [Xen-devel] Xen Security Advisory 35 (CVE-2013-0152) - Nested
 HVM exposes host to being driven out of memory by guest

On Tue, 22 Jan 2013, Xen.org security team wrote:

> To fix both XSA 34 and XSA 35, first apply xsa34-4.2.patch from XSA 34
> and then *also* apply xsa35-4.2-with-xsa34.patch from this advisory.

The xsa35-4.2-with-xsa34.patch patch is malformed,
@@ -3862,6 +3862,10 @@ long do_hvm_op(unsigned long op, XEN_GUE
should be
@@ -3862,6 +3862,11 @@ long do_hvm_op(unsigned long op, XEN_GUE

 	Michael Young

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.