xen is vulnerable to privilege escalation. The vulnerability exists as the pyGrub boot loader did not honor the “password” option in the grub.conf file for para-virtualized guests. Users with access to a guest’s console could use this flaw to bypass intended access restrictions and boot the guest with arbitrary kernel boot options, allowing them to get root privileges in the guest’s operating system. With this update, pyGrub correctly honors the “password” option in grub.conf for para-virtualized guests.
lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
secunia.com/advisories/36908
www.openwall.com/lists/oss-security/2009/09/25/1
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2009-1472.html
www.securityfocus.com/bid/36523
www.securitytracker.com/id?1022950
xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3
access.redhat.com/errata/RHSA-2009:1472
bugzilla.redhat.com/show_bug.cgi?id=525740
bugzilla.redhat.com/show_bug.cgi?id=525740#c0
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466