Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 24 Sep 2014 02:03:20 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 104 - Race condition in HVMOP_track_dirty_vram

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Xen Security Advisory XSA-104
> 
> The routine controlling the setup of dirty video RAM tracking latches
> the value of a pointer before taking the respective guarding lock, thus
> making it possible for a stale pointer to be used

Use CVE-2014-7154.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUIl34AAoJEKllVAevmvmsbdkH/1DkA7TpowOy5CN0Pceb5fm8
xOCXJ3fUu2bR/z8xKGS2wi8QtuiisWngeKNnCLeT50PTZZxiTEuulpAwCHLDxcMM
h4ndULD2+pE0YrieZv8rqNIPW1kt0RNNAEYYH4dzoWjasTxbbwkiz8c9EMmcVCAK
90CNUon8lhONYsClae4/NGnIVyyTsQ7Oe2gkTVn7fGWD66L701gjJBCsFH3kysZH
+ZnaRamHfo1ucZU6Z099i5LqGWDNn4yeNIkPknGEeX/SWCksFCpWU80n2pA0RHo6
jCiSk6NqUi1wB3/EzBHurfopAc7/l1L6A/jraitL0kahcTj6s5Go4ZheDIvjiRA=
=Qdj8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.