|
Message-Id: <201404231419.s3NEJ2rS022825@linus.mitre.org> Date: Wed, 23 Apr 2014 10:19:02 -0400 (EDT) From: cve-assign@...re.org To: security@....org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Xen Security Advisory 94 - ARM hypervisor crash on guest interrupt controller access -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > XSA-94 > When handling a guest access to the virtual GIC distributor (interrupt > controller) Xen could dereference a pointer before checking it for > validity leading to a hypervisor crash and host Denial of Service. > A buggy or malicious guest can crash the host. Use CVE-2014-2986. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTV8t1AAoJEKllVAevmvmst/cH/js+frpyUAFXSnPvoauD+DJg 4yKPcDeiTAEFe9p8b8SIshWHkWPug1jZ+aTwB5gMfKiHHsLA/g9yGaAYNLTWNt/j WC24BDRg9JPRd0wIEmf18cSWcYV8YljoI3WbYY4Y+SVTNDmOrDAhbyMnmBEFCm9X es+elg4ysVza7gL0WZbB3Zm8grLhXSb8rMgU/cPGs1IEwTr+j0BStslJQ9YzJlaZ TSEI583C2uvJfS4wC9fpwXrHgT8SON9NxLWwvvexVFJ7rcj5P+4w8oawKqHwrWI8 nJP8y/LL/hwFqMvaWHZI4oFl2AgLhIkYt4+EDcdiFzVuOxOpLIhklMRhIJGReAE= =cp7f -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.