Date: Tue, 22 Jan 2013 21:09:29 +0000 (GMT) From: M A Young <m.a.young@...ham.ac.uk> To: "Xen.org security team" <security@....org> cc: xen-announce@...ts.xen.org, xen-devel@...ts.xen.org, xen-users@...ts.xen.org, oss-security@...ts.openwall.com Subject: Re: [Xen-devel] Xen Security Advisory 35 (CVE-2013-0152) - Nested HVM exposes host to being driven out of memory by guest On Tue, 22 Jan 2013, Xen.org security team wrote: > To fix both XSA 34 and XSA 35, first apply xsa34-4.2.patch from XSA 34 > and then *also* apply xsa35-4.2-with-xsa34.patch from this advisory. The xsa35-4.2-with-xsa34.patch patch is malformed, @@ -3862,6 +3862,10 @@ long do_hvm_op(unsigned long op, XEN_GUE should be @@ -3862,6 +3862,11 @@ long do_hvm_op(unsigned long op, XEN_GUE Michael Young
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.