|
Message-ID: <4ABCD8C1.8090409@redhat.com> Date: Fri, 25 Sep 2009 16:50:41 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Michal Novotny <minovotn@...hat.com> Subject: CVE Request -- Xen -- PyGrub Hello Steve, vendors, Xen's PyGrub, when grub.conf was configured with password protection, did not check for the password at host boot time. An attacker, with physical access to the host, could use this flaw to change the OS booting configuration. Upstream patches: ----------------- http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3 http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1 http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585 http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0 Affected Xen versions: ---------------------- Issue confirmed in Xen-3.0.3, Xen-3.3.0 and Xen-3.3.1. References: ----------- https://bugzilla.redhat.com/show_bug.cgi?id=525740 https://bugzilla.redhat.com/show_bug.cgi?id=525740#c1 (PoC) Could you please allocate a new CVE id? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.