|
|
Message-ID: <alpine.DEB.2.00.1301222106280.32543@procyon.dur.ac.uk>
Date: Tue, 22 Jan 2013 21:09:29 +0000 (GMT)
From: M A Young <m.a.young@...ham.ac.uk>
To: "Xen.org security team" <security@....org>
cc: xen-announce@...ts.xen.org, xen-devel@...ts.xen.org,
xen-users@...ts.xen.org, oss-security@...ts.openwall.com
Subject: Re: [Xen-devel] Xen Security Advisory 35 (CVE-2013-0152) - Nested
HVM exposes host to being driven out of memory by guest
On Tue, 22 Jan 2013, Xen.org security team wrote:
> To fix both XSA 34 and XSA 35, first apply xsa34-4.2.patch from XSA 34
> and then *also* apply xsa35-4.2-with-xsa34.patch from this advisory.
The xsa35-4.2-with-xsa34.patch patch is malformed,
@@ -3862,6 +3862,10 @@ long do_hvm_op(unsigned long op, XEN_GUE
should be
@@ -3862,6 +3862,11 @@ long do_hvm_op(unsigned long op, XEN_GUE
Michael Young
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.