[USN-527-1] xen-3.0 vulnerability

看板Bugtraq作者時間18年前 (2007/10/10 03:07), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
--Zpx5Rz5PkYgiNBE6 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=20 Ubuntu Security Notice USN-527-1 October 05, 2007 xen-3.0 vulnerability CVE-2007-4993 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D A security issue affects the following Ubuntu releases: Ubuntu 7.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 7.04: xen-utils-3.0 3.0.3-0ubuntu10.1 In general, a standard system upgrade is sufficient to affect the necessary changes. Details follow: Joris van Rantwijk discovered that the Xen host did not correctly validate the contents of a Xen guests's grug.conf file. Xen guest root users could exploit this to run arbitrary commands on the host when the guest system was rebooted. Updated packages for Ubuntu 7.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/xen-3.0_3.0.3-0ub= untu10.1.diff.gz Size/MD5: 43307 2f531fea82cc88494f81bbdd050ef824 http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/xen-3.0_3.0.3-0ub= untu10.1.dsc Size/MD5: 1023 3336b4ce7f13d381400bb6d0a80cd0b7 http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-3.0_3.0.3= =2Eorig.tar.gz Size/MD5: 5465571 98ac5465ff111a3ff76a985bf755c6a5 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-docs-3.0_= 3.0.3-0ubuntu10.1_all.deb Size/MD5: 533754 b65c9495bcfa717ed1a5b8c46f999402 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/libxen3.0-dev_3.0= =2E3-0ubuntu10.1_amd64.deb Size/MD5: 70804 ffc9f9d0ab7f8df7df2e0ffd8f08285c http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/libxen3.0_3.0.3-0= ubuntu10.1_amd64.deb Size/MD5: 73492 dd35493b60f4792e345abda43d20aa8b http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/python-xen3.0= _3.0.3-0ubuntu10.1_amd64.deb Size/MD5: 420742 a1638f0e7cbbf5685b041abc158dfa8a http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-hyperviso= r-3.0-amd64_3.0.3-0ubuntu10.1_amd64.deb Size/MD5: 271940 66492dd5d6a4c52fc97114d2bb983ffa http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-ioemu-3.0= _3.0.3-0ubuntu10.1_amd64.deb Size/MD5: 317284 88a2027bff8d08983d0d8771859e68fd http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-utils-3.0= _3.0.3-0ubuntu10.1_amd64.deb Size/MD5: 283572 8e9197196e594faf891ce535014b6c71 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/libxen3.0-dev_3.0= =2E3-0ubuntu10.1_i386.deb Size/MD5: 70800 0295889477fb1b8c83edb7cfe2b6872a http://security.ubuntu.com/ubuntu/pool/main/x/xen-3.0/libxen3.0_3.0.3-0= ubuntu10.1_i386.deb Size/MD5: 69486 b24236890f2ba901e4852188a72ebb22 http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/python-xen3.0= _3.0.3-0ubuntu10.1_i386.deb Size/MD5: 416932 81e667521fe88fe02db3355b42bf5e5b http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-hyperviso= r-3.0-i386-pae_3.0.3-0ubuntu10.1_i386.deb Size/MD5: 269408 1c2d69bafb3ca2d540dc13105ac40e10 http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-hyperviso= r-3.0-i386_3.0.3-0ubuntu10.1_i386.deb Size/MD5: 251070 facaee8d4581cdbfe7682b30e87e8065 http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-ioemu-3.0= _3.0.3-0ubuntu10.1_i386.deb Size/MD5: 298840 6a863568a47389b1d2990c97bdcb2620 http://security.ubuntu.com/ubuntu/pool/universe/x/xen-3.0/xen-utils-3.0= _3.0.3-0ubuntu10.1_i386.deb Size/MD5: 272848 90980654788696fad35a613fcc562a88 --Zpx5Rz5PkYgiNBE6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHC7WaH/9LqRcGPm0RAj2ZAKCAND9s9PAmTRVCKT6sRV6zWIgnrACdFbR5 u12MbQe5ermwTLr3dC5vT70= =sEOT -----END PGP SIGNATURE----- --Zpx5Rz5PkYgiNBE6--
文章代碼(AID): #172z6E00 (Bugtraq)