Summary
Ubuntu Update for Linux kernel vulnerabilities USN-527-1
Solution
Please Install the Updated Packages.
Insight
Joris van Rantwijk discovered that the Xen host did not correctly validate the contents of a Xen guests's grug.conf file. Xen guest root users could exploit this to run arbitrary commands on the host when the guest system was rebooted.
Affected
xen-3.0 vulnerability on Ubuntu 7.04
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2007-4993 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities