First published: Fri Sep 25 2009(Updated: )
pyGrub bootloader used to boot Xen para-virtualized guests did not have support for password command as supported by normal grub. If this option was used in grub.conf, it did not restrict users with access to para-virtualized guest's console from booting guest or changing kernel boot parameters without providing configured password. This could allow user with access to VMs console to get root privileges on the guest's operating system. Upstream patches: ----------------- <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3">http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3</a> <a href="http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de">http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1">http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585">http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0">http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0</a> CVE Request: ------------ <a href="http://www.openwall.com/lists/oss-security/2009/09/25/1">http://www.openwall.com/lists/oss-security/2009/09/25/1</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | =3.3.1 | |
Xen Xen | =3.0.3 | |
Xen Xen | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.