User: Password:
|
|
Subscribe / Log in / New account

xen: guest privilege escalation

Package(s):xen CVE #(s):CVE-2009-3525
Created:October 2, 2009 Updated:May 25, 2010
Description: From the Red Hat advisory: The pyGrub boot loader did not honor the "password" option in the grub.conf file for para-virtualized guests. Users with access to a guest's console could use this flaw to bypass intended access restrictions and boot the guest with arbitrary kernel boot options, allowing them to get root privileges in the guest's operating system. With this update, pyGrub correctly honors the "password" option in grub.conf for para-virtualized guests.
Alerts:
SuSE SUSE-SR:2010:012 evolution-data-server, python/libpython2_6-1_0, mozilla-nss, memcached, texlive/te_ams, mono/bytefx-data-mysql, libpng-devel, apache2-mod_php5, ncpfs, pango, libcmpiutil 2010-05-25
Red Hat RHSA-2009:1472-01 xen 2009-10-01
CentOS CESA-2009:1472 xen 2009-10-30

(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds