Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 18 Mar 2014 10:17:15 -0400 (EDT)
From: cve-assign@...re.org
To: pmatouse@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com,
        libvirt-security@...hat.com, eblake@...hat.com, berrange@...hat.com
Subject: Re: CVE request -- libvirt: unprivileged user can crash libvirtd during spice migration

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Upstream fix:
> http://libvirt.org/git/?p=libvirt.git;a=commit;h=484cc321

Use CVE-2013-7336.

> (this issue was reported to libvirt-security mailing list in the year
> 2k13 so might need 2k13 CVE)

http://libvirt.org/securityprocess.html says the libvirt-security
mailing list is "while this email address is backed by a mailing list,
it is invitation only." The date of a report to a private list does
not directly affect the date portion of a CVE ID. However, there was
an apparently public commit in 2013 that mentioned "the daemon
crashed."

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTKFS/AAoJEKllVAevmvmsQo4H/izs/JxyMWwWqc4s5IDV5vXt
mTgCBHrzOxHqo9X1VsaKYCsFwjccS/LZcGuQOwkuLZzZwilfzxhzwbFHqQITigbG
RrLeAdXFofCUrrzZsgpuh8xr/PKBr1f2mzJxPmjDIcfdaLzHcZBb57YCIxdCYqGY
muohfA9G67STmVKY5jKfP9Obpe/pmINIrUWC10ATQdk7qJdDiITveCSX3LDqTyOl
O3w1OlLjKc99nWFQN4b4I0CCSFIOA91A6EDwW9hrY3vDRIMsqdDf/RilFn/vaUkd
Ih5D5wmpKWy1zXvmX/XF0FsqYrpCagNoA5iAZYjtntCaD/r1BAijlINGKcARo/s=
=1aqs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.