|
Message-ID: <4E8C8834.5050900@mvista.com> Date: Wed, 05 Oct 2011 06:39:16 -1000 From: akuster <akuster@...sta.com> To: oss-security@...ts.openwall.com CC: Huzaifa Sidhpurwala <huzaifas@...hat.com> Subject: Re: kexec-tools: Multiple security flaws by management of kdump core files and ramdisk images What version does this affect ? - Armin On 10/04/2011 04:34 PM, Huzaifa Sidhpurwala wrote: > Hi All, > > Kevan Carstensen reported multiple security flaws in kexec-tools, > details are as follows: > > 1. CVE-2011-3588: > > The default value of "StrictHostKeyChecking=no" has been used for kdump/ > mkdumprd openssh integration. A remote malicious kdump server could use > this flaw to impersonate the intended, correct kdump server to obtain > security sensitive information (kdump core files). > > 2. CVE-2011-3589 > > mkdumprd utility copied content of certain directories into newly > created initial ramdisk images, potentially leading to information leak. > > 3. CVE-2011-2390 > > mkdumprd utility created the final initial ramdisk image with > world-readable permissions, possibly leading to information leak. > > Reference: > https://bugzilla.redhat.com/show_bug.cgi?id=716439 > >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.