|
Message-ID: <4AC31FD9.5050507@redhat.com> Date: Wed, 30 Sep 2009 11:07:37 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org>, Michal Novotny <minovotn@...hat.com> Subject: Re: CVE Request (Sort of urgent) -- Xen -- PyGrub Hello Steve, any progress while reviewing the issue and assigning a CVE? Reformulated flaw details can be found here: https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0 And further explanation of it's security implications here: https://bugzilla.redhat.com/show_bug.cgi?id=525740#c3 Thanks, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team Jan Lieskovsky wrote: > Hello Steve, vendors, > > Xen's PyGrub, when grub.conf was configured with password protection, > did not check for the password at host boot time. An attacker, with > physical > access to the host, could use this flaw to change the OS booting > configuration. > > Upstream patches: > ----------------- > > http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3 > http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de > http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1 > http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585 > http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0 > > Affected Xen versions: > ---------------------- > Issue confirmed in Xen-3.0.3, Xen-3.3.0 and Xen-3.3.1. > > References: > ----------- > https://bugzilla.redhat.com/show_bug.cgi?id=525740 > https://bugzilla.redhat.com/show_bug.cgi?id=525740#c1 (PoC) > > Could you please allocate a new CVE id? > > Thanks && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.