Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 25 Sep 2009 16:50:41 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        Michal Novotny <minovotn@...hat.com>
Subject: CVE Request -- Xen -- PyGrub

Hello Steve, vendors,

   Xen's PyGrub, when grub.conf was configured with password protection,
did not check for the password at host boot time. An attacker, with physical
access to the host, could use this flaw to change the OS booting configuration.

Upstream patches:
-----------------

http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3
http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de
http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1
http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585
http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0

Affected Xen versions:
----------------------
Issue confirmed in Xen-3.0.3, Xen-3.3.0 and Xen-3.3.1.

References:
-----------
https://bugzilla.redhat.com/show_bug.cgi?id=525740
https://bugzilla.redhat.com/show_bug.cgi?id=525740#c1 (PoC)

Could you please allocate a new CVE id?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.