Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 27 Jun 2014 11:37:26 -0400 (EDT)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Xen Security Advisory 101 - information leak via gnttab_setup_table on ARM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> XSA-101

> When initialising an internal data structure on ARM platform Xen was
> not correctly initialising the memory containing the list of a
> domain's grant table pages.

> Malicious guest administrators can obtain some of the memory contents
> of other domains

This was previously assigned CVE-2014-4022. We're not sure why a version
of XSA-101 without that CVE ID was sent here on 25 June.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTrY8RAAoJEKllVAevmvmsdPYH+QF1sI1FYtaD8/+H0k9BKbSE
CX9NlDT/GHkAO7tVnF6109pxdt5BFsTSC2kM+wDLVvzr3QIiw1295ckuiXKkzsQf
f8pyB2uUzoKiKiaInPjWhWJpNfJQkMnxqyEyGnlqplsTAwrrzmGjgbCE0hJKOwoy
lrP0T2pk7d5JCgVTQwB6bTlF/yHltWYB8yaZYvaLSTxZF3ZZpi1wmy1GFRWKF+8c
bKiAUQpexO6aVFyrgQd67mnm5GAGai7+6Fnv0XfKcH/QviPYaB9px3yQyaslRHOY
Dt9kNjY+dhD1ZF7/imWhGmEdDOU5WXAneHmy2V10f/Y96JKbHNWMA8ynMh26pUU=
=rNka
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.