|
Message-Id: <20150420225721.662EEB2E075@smtpvbsrv1.mitre.org> Date: Mon, 20 Apr 2015 18:57:21 -0400 (EDT) From: cve-assign@...re.org To: security@....org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Xen Security Advisory 132 - Information leak through XEN_DOMCTL_gettscinfo -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Xen Security Advisory XSA-132 > > The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding > field subsequently copied to guest memory. Use CVE-2015-3340. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVNYOqAAoJEKllVAevmvmsfcEH/2oqbTU2VAtVzJdjLlmwEol7 OmtA6ZSvHZq3q45UKctDPcXFpoBQ4WIFawtHfLrWfsfEfcw23G0hyb4r0lkkSAXg kpEpG6IeTMg0jcFhfNFDPqP0YnuKBW6m2gwkzLg6Sna+bhkN1GtsYHw/52UZ1oQA w4cJXZqYsPg0trd94LGnJhlidB/EnJOCFjY262q//BkcI44pfjhvs1sjdqqGfBxY 6WBXg9L1mEFdtECLSHBuiSgHYjPXr4+CVzjEdSvAuazm+F5OoU5kpLB6WsOpfLM2 +lFxU0kGeh3QxvZbkhvlBxQeSE8NW9naZzj/G+Dn582Z7jLMI6LnJv4vT2t7myo= =bcN4 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.