oss-sec mailing list archives
Re: CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper
From: cve-assign () mitre org
Date: Mon, 14 Dec 2015 16:39:16 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a9c4227b4b91453510
Use CVE-2015-8556 for this issue only in Gentoo.
I have no idea if QEMU upstream recommends suid/fscaps in some documentation, or something similar
We didn't find any related recommendation. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWbzMvAAoJEL54rhJi8gl5BAEP/AlC+o90/2XVr9kloGoul5y+ 18hSeoZZNNTH3kBDodD9Cg/ugIpfnUE+oWxNi/7XCwr/mNSMHusoGCXfZEVpH7m7 QrnYUlZ3vIuSHzwWrbJZJVDLW7cIChkiXPeMUJcWhAHHMYXZt+HV18hdbcyd6I9B 2r3ehxuoxM5aMQePh1wdGeDCKbuRJQeAV4+Ccr51Q6Rx7bLa3EjwVM8mTdcFqw+Y 4SXC8nwkhMvWyRDjlbVlXqM6HDBF53v3wNnnH9Pd7zZJKhOxPIwIO88aKJ6J4SA9 7boKIO2xFP/J0ceFvdg5zAyRoIfH61XKWF9qdcRyEDmqc5Kr1Mbn3n99ZEBk0q74 WBfWqipZCNOmlty2piDH9gNRHH2CAlN2kpSUTQR/vR3uMyvsrJAzEs03Wfp9hhve RiUIo5ZIJuZdfUJKSvaTrt1qpBzPREfA4r+ZKd+SOF17cjLXicbgG57rHOSO7ecC EDeOJqdOLj6DaSC0QQRty5davufOBTcIK6GuPZXTGGsrVwmLQcfl+9rSd44mux3L ClNyblsyLQ+qKHmrotWVZWvQhmZ15ZbiO3tJIELC1sz1bpTbrG+TZ1O6aR65cnye UTgjw5W3CB0ZtJr6UspxmUmH087t6KG6nDjtomu7pVIaMiS/yb8olhyy9rlDJu/8 AOW73NnXp4LdPitgpZAB =E5ZP -----END PGP SIGNATURE-----
Current thread:
- CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper Jason A. Donenfeld (Dec 14)
- <Possible follow-ups>
- CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper Jason A. Donenfeld (Dec 14)
- Re: CVE Request: Local Privilege Escalation in QEMU virtfs-proxy-helper cve-assign (Dec 14)