Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 19 Oct 2010 01:18:58 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Petr Matousek <pmatouse@...hat.com>, coley@...us.mitre.org
Subject: Re: CVE request -- libguestfs: missing disk format
 specifier when adding a disk

On 10/19/2010 12:10 AM, Petr Matousek wrote:
> Hello Steve, vendors.
>
> Description:
> Libguestfs doesn't currently allow the format of a disk to be specified explicitly.
> Because of that malicious guest admin can exploit automatic image format detection
> in qemu, when the libguestfs is used to administer the image, to read arbitrary
> file on host via forging a image header with backing store.
>
> References:
> https://bugzilla.redhat.com/show_bug.cgi?id=643958
>
> Could you please allocate a CVE identifier for this issue?

Petr, please use CVE-2010-3851. Thanks.

Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.