oss-sec mailing list archives

Re: Xen Security Advisory 83 - Out-of-memory condition yielding memory corruption during IRQ setup


From: cve-assign () mitre org
Date: Thu, 23 Jan 2014 08:40:50 -0500 (EST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Xen Security Advisory XSA-83
Malicious guest administrators can trigger a use-after-free error

Use CVE-2014-1642.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJS4RseAAoJEKllVAevmvmshVkIALxl5LOA1zRbmZQxpe4e/0dv
XTPSYx/TdVh8lsyAht50BtfrCNQxWyGeZcIXuQrHgp+6C91EQidZnR/ylhKuPT5X
n/YP23jJ0tfmUCnkciFWIEVz025IMJnOys1vk/fi+ZLHQz9wvIpR7c6TrKsrUlvV
OlBgAJIGRkxEFuOrzLDoM9eH94J6dhY1viZ1uGPcrTu541BXPt8qn64jKxLaid2V
SmK20kudkku6z2DbVrEt2a2ul22m7jefYEW52x1smmNFaj5Ekh2i5R3BQzfX+7YO
B/MuXuf3lMcF0vL6311ObXTZdO2utWuB2he1ozCwytiNaPem3w/cPzT4QuZ/jv8=
=Ueqv
-----END PGP SIGNATURE-----


Current thread: