Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 19 Dec 2008 10:59:40 +0100
From: Jan Lieskovsky <>
To: "Steven M. Christey" <>
Subject: CVE Request -- Xen (Upstream patch for CVE-2008-4405 is incomplete)

Hello Steve,

  originally CVE id of CVE-2008-4405 has been assigned to
the following Xen backend issue:

Original references:
(place where was pointed out, this is a security problem -^).

Original patch:

The problem:

Daniel P.Berrange has discovered, this original patch is incomplete
to fix this issue. More details here:

Credit goes to: Daniel P.Berrange 

Steve, could you please allocate a new CVE id for this revised

Thanks, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ