Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 14 Dec 2015 16:39:16 -0500 (EST)
From: cve-assign@...re.org
To: Jason@...c4.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a9c4227b4b91453510

Use CVE-2015-8556 for this issue only in Gentoo.

> I have no idea if QEMU upstream recommends suid/fscaps in some
> documentation, or something similar

We didn't find any related recommendation.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=E5ZP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.