Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Sep 2009 11:07:37 +0200
From: Jan Lieskovsky <>
CC: "Steven M. Christey" <>,
        Michal Novotny <>
Subject: Re: CVE Request (Sort of urgent) -- Xen -- PyGrub

Hello Steve,

   any progress while reviewing the issue and assigning a CVE?

Reformulated flaw details can be found here:

And further explanation of it's security implications here:

Thanks, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Jan Lieskovsky wrote:
> Hello Steve, vendors,
>   Xen's PyGrub, when grub.conf was configured with password protection,
> did not check for the password at host boot time. An attacker, with 
> physical
> access to the host, could use this flaw to change the OS booting 
> configuration.
> Upstream patches:
> -----------------
> Affected Xen versions:
> ----------------------
> Issue confirmed in Xen-3.0.3, Xen-3.3.0 and Xen-3.3.1.
> References:
> -----------
> (PoC)
> Could you please allocate a new CVE id?
> Thanks && Regards, Jan.
> -- 
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.