|
Message-Id: <20151214213916.E045EB2E0A1@smtpvbsrv1.mitre.org> Date: Mon, 14 Dec 2015 16:39:16 -0500 (EST) From: cve-assign@...re.org To: Jason@...c4.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a9c4227b4b91453510 Use CVE-2015-8556 for this issue only in Gentoo. > I have no idea if QEMU upstream recommends suid/fscaps in some > documentation, or something similar We didn't find any related recommendation. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWbzMvAAoJEL54rhJi8gl5BAEP/AlC+o90/2XVr9kloGoul5y+ 18hSeoZZNNTH3kBDodD9Cg/ugIpfnUE+oWxNi/7XCwr/mNSMHusoGCXfZEVpH7m7 QrnYUlZ3vIuSHzwWrbJZJVDLW7cIChkiXPeMUJcWhAHHMYXZt+HV18hdbcyd6I9B 2r3ehxuoxM5aMQePh1wdGeDCKbuRJQeAV4+Ccr51Q6Rx7bLa3EjwVM8mTdcFqw+Y 4SXC8nwkhMvWyRDjlbVlXqM6HDBF53v3wNnnH9Pd7zZJKhOxPIwIO88aKJ6J4SA9 7boKIO2xFP/J0ceFvdg5zAyRoIfH61XKWF9qdcRyEDmqc5Kr1Mbn3n99ZEBk0q74 WBfWqipZCNOmlty2piDH9gNRHH2CAlN2kpSUTQR/vR3uMyvsrJAzEs03Wfp9hhve RiUIo5ZIJuZdfUJKSvaTrt1qpBzPREfA4r+ZKd+SOF17cjLXicbgG57rHOSO7ecC EDeOJqdOLj6DaSC0QQRty5davufOBTcIK6GuPZXTGGsrVwmLQcfl+9rSd44mux3L ClNyblsyLQ+qKHmrotWVZWvQhmZ15ZbiO3tJIELC1sz1bpTbrG+TZ1O6aR65cnye UTgjw5W3CB0ZtJr6UspxmUmH087t6KG6nDjtomu7pVIaMiS/yb8olhyy9rlDJu/8 AOW73NnXp4LdPitgpZAB =E5ZP -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.