Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150420225721.662EEB2E075@smtpvbsrv1.mitre.org>
Date: Mon, 20 Apr 2015 18:57:21 -0400 (EDT)
From: cve-assign@...re.org
To: security@....org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Xen Security Advisory 132 - Information leak through XEN_DOMCTL_gettscinfo

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>                     Xen Security Advisory XSA-132
> 
> The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding
> field subsequently copied to guest memory.

Use CVE-2015-3340.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVNYOqAAoJEKllVAevmvmsfcEH/2oqbTU2VAtVzJdjLlmwEol7
OmtA6ZSvHZq3q45UKctDPcXFpoBQ4WIFawtHfLrWfsfEfcw23G0hyb4r0lkkSAXg
kpEpG6IeTMg0jcFhfNFDPqP0YnuKBW6m2gwkzLg6Sna+bhkN1GtsYHw/52UZ1oQA
w4cJXZqYsPg0trd94LGnJhlidB/EnJOCFjY262q//BkcI44pfjhvs1sjdqqGfBxY
6WBXg9L1mEFdtECLSHBuiSgHYjPXr4+CVzjEdSvAuazm+F5OoU5kpLB6WsOpfLM2
+lFxU0kGeh3QxvZbkhvlBxQeSE8NW9naZzj/G+Dn582Z7jLMI6LnJv4vT2t7myo=
=bcN4
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.