|
Message-Id: <201406271537.s5RFbQRf010546@linus.mitre.org> Date: Fri, 27 Jun 2014 11:37:26 -0400 (EDT) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: Re: Xen Security Advisory 101 - information leak via gnttab_setup_table on ARM -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > XSA-101 > When initialising an internal data structure on ARM platform Xen was > not correctly initialising the memory containing the list of a > domain's grant table pages. > Malicious guest administrators can obtain some of the memory contents > of other domains This was previously assigned CVE-2014-4022. We're not sure why a version of XSA-101 without that CVE ID was sent here on 25 June. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTrY8RAAoJEKllVAevmvmsdPYH+QF1sI1FYtaD8/+H0k9BKbSE CX9NlDT/GHkAO7tVnF6109pxdt5BFsTSC2kM+wDLVvzr3QIiw1295ckuiXKkzsQf f8pyB2uUzoKiKiaInPjWhWJpNfJQkMnxqyEyGnlqplsTAwrrzmGjgbCE0hJKOwoy lrP0T2pk7d5JCgVTQwB6bTlF/yHltWYB8yaZYvaLSTxZF3ZZpi1wmy1GFRWKF+8c bKiAUQpexO6aVFyrgQd67mnm5GAGai7+6Fnv0XfKcH/QviPYaB9px3yQyaslRHOY Dt9kNjY+dhD1ZF7/imWhGmEdDOU5WXAneHmy2V10f/Y96JKbHNWMA8ynMh26pUU= =rNka -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.