Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 24 Sep 2014 02:03:20 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 104 - Race condition in HVMOP_track_dirty_vram

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Xen Security Advisory XSA-104
> 
> The routine controlling the setup of dirty video RAM tracking latches
> the value of a pointer before taking the respective guarding lock, thus
> making it possible for a stale pointer to be used

Use CVE-2014-7154.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUIl34AAoJEKllVAevmvmsbdkH/1DkA7TpowOy5CN0Pceb5fm8
xOCXJ3fUu2bR/z8xKGS2wi8QtuiisWngeKNnCLeT50PTZZxiTEuulpAwCHLDxcMM
h4ndULD2+pE0YrieZv8rqNIPW1kt0RNNAEYYH4dzoWjasTxbbwkiz8c9EMmcVCAK
90CNUon8lhONYsClae4/NGnIVyyTsQ7Oe2gkTVn7fGWD66L701gjJBCsFH3kysZH
+ZnaRamHfo1ucZU6Z099i5LqGWDNn4yeNIkPknGEeX/SWCksFCpWU80n2pA0RHo6
jCiSk6NqUi1wB3/EzBHurfopAc7/l1L6A/jraitL0kahcTj6s5Go4ZheDIvjiRA=
=Qdj8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ