|
Message-Id: <20140924060320.9575C72E066@smtpvbsrv1.mitre.org> Date: Wed, 24 Sep 2014 02:03:20 -0400 (EDT) From: cve-assign@...re.org To: security@....org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Xen Security Advisory 104 - Race condition in HVMOP_track_dirty_vram -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Xen Security Advisory XSA-104 > > The routine controlling the setup of dirty video RAM tracking latches > the value of a pointer before taking the respective guarding lock, thus > making it possible for a stale pointer to be used Use CVE-2014-7154. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUIl34AAoJEKllVAevmvmsbdkH/1DkA7TpowOy5CN0Pceb5fm8 xOCXJ3fUu2bR/z8xKGS2wi8QtuiisWngeKNnCLeT50PTZZxiTEuulpAwCHLDxcMM h4ndULD2+pE0YrieZv8rqNIPW1kt0RNNAEYYH4dzoWjasTxbbwkiz8c9EMmcVCAK 90CNUon8lhONYsClae4/NGnIVyyTsQ7Oe2gkTVn7fGWD66L701gjJBCsFH3kysZH +ZnaRamHfo1ucZU6Z099i5LqGWDNn4yeNIkPknGEeX/SWCksFCpWU80n2pA0RHo6 jCiSk6NqUi1wB3/EzBHurfopAc7/l1L6A/jraitL0kahcTj6s5Go4ZheDIvjiRA= =Qdj8 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.