Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 4 Jun 2014 10:56:45 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 96 - Vulnerabilities in HVM MSI injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> XSA-96

> HVMOP_inject_msi ... doesn't check the returned pointer for being
> non-NULL before dereferencing

Use CVE-2014-3967.


> handles certain errors by logging messages, without ... rate limiting
> ... spamming of the hypervisor

Use CVE-2014-3968.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTjzMLAAoJEKllVAevmvmsrgcIAJOjpx9mtG4xU0datjs649TC
IjObNZjgQxd9JGW637asaamyBD2qpt/h692FuXz/Iuc9mKQ1l2dgI3PbMqXkBhyF
5MyggeUFWqthefcQXHOrU88I/6roBLmfmJ/QPhSPoDdX7LJpXk6LhnFxt7oG5Ex0
8hE33fJZ/MQ7p6NaLYtlBZSoOTGD8eud2eSYK8Xg6gYrxFHfX8z0CczxFQVEsUKq
UXNooExJSErEVqna9awzfTpqlKy3tuxONJ2iuB93gWVDNBgrptI25dQzjRPGRxy/
e+NifrIXp1KoEuo7/MpzmESChFeWjopfN1jjLxU4e53ivi59u86vYBEYnt9I86I=
=dTrg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.