|
Message-Id: <20141121054023.B080B6C0046@smtpvmsrv1.mitre.org> Date: Fri, 21 Nov 2014 00:40:23 -0500 (EST) From: cve-assign@...re.org To: security@....org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Xen Security Advisory 113 - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > XSA-113 > > An error handling path in the processing of MMU_MACHPHYS_UPDATE failed > to drop a page reference which was acquired in an earlier processing > step. Use CVE-2014-9030. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUbs+jAAoJEKllVAevmvmsUO4H/RXLBvibHcX1015JXXmDDbrY VzS2/OpFz5eS/L9DBOqan2NNCXJ3yNH0gvWtZgSj6jWL499ixh3Tn9LgoBesqJu5 KvKgky/RiY50WPN8EgQJ+BRXsyjXr37YbefnOgipx2ep9mqivwZirru/hygMRY1j ImaNwAUdNHV0W01um4Mvev7OQ4dRuI3Rk2HotBuRUkUS/K0bUR6a5dKkP1W8K3at X1Z26NIFF2B50lFFMYFdLQ7+l0Wl4GLe3fmMf6lqIYO35OHdMCtnvmO2c8quWysl VRKXwjI6OY80JM+BYIA/XY/qkTPn1QriXkIMq410gqZqODmxYQ2UUo4lxkSTv1Q= =Ff2Q -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.