|
Message-Id: <201402121558.s1CFwExm012909@linus.mitre.org> Date: Wed, 12 Feb 2014 10:58:14 -0500 (EST) From: cve-assign@...re.org To: security@....org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Xen Security Advisory 88 - use-after-free in xc_cpupool_getinfo() under memory pressure -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > If xc_cpumap_alloc() fails then xc_cpupool_getinfo() will free and incorrectly > return the then-free pointer to the result structure. > > An attacker may be able to cause a multi-threaded toolstack using this > function to race against itself Use CVE-2014-1950. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJS+5jAAAoJEKllVAevmvmsbXIIALonk+ClfcttLGQ7UI8kv4tu sTWSC9f/XEpL5/73sufoYnl3UIZQeVeHaJQjccgTbZpkvhoREPdrTrjR/CHpfC0K jIJm5r69eAaCrasqpCP89yYjk3MUj6wKyKGh62NGv+G28ccW1JtcEp63FVKHSVgC nTOq5UMxYDu8MXmjmPUIqC/vSNdBiLm/01tiyuc6OBHTYp+GKIAnFhDt5iarvCO6 eD1z8uNew62u5Gi6WlPl6WWZhylLyWqmnv9Yu78jGye6/FnRrg33fs3U1Vtfhwt8 8crA6xwqEUoxNr8mmUjxyk57WPRigWL7etr8ZlDi9XbXY03JvFT/Iwxnixno2Lc= =8vt+ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.