Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 23 Apr 2014 10:19:02 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 94 - ARM hypervisor crash on guest interrupt controller access

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> XSA-94

> When handling a guest access to the virtual GIC distributor (interrupt
> controller) Xen could dereference a pointer before checking it for
> validity leading to a hypervisor crash and host Denial of Service.

> A buggy or malicious guest can crash the host.

Use CVE-2014-2986.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTV8t1AAoJEKllVAevmvmst/cH/js+frpyUAFXSnPvoauD+DJg
4yKPcDeiTAEFe9p8b8SIshWHkWPug1jZ+aTwB5gMfKiHHsLA/g9yGaAYNLTWNt/j
WC24BDRg9JPRd0wIEmf18cSWcYV8YljoI3WbYY4Y+SVTNDmOrDAhbyMnmBEFCm9X
es+elg4ysVza7gL0WZbB3Zm8grLhXSb8rMgU/cPGs1IEwTr+j0BStslJQ9YzJlaZ
TSEI583C2uvJfS4wC9fpwXrHgT8SON9NxLWwvvexVFJ7rcj5P+4w8oawKqHwrWI8
nJP8y/LL/hwFqMvaWHZI4oFl2AgLhIkYt4+EDcdiFzVuOxOpLIhklMRhIJGReAE=
=cp7f
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.