User-mode Linux (UML) 2.4.17-8不限制内核地址空间的访问，本地用户可以利用该漏洞执行任意代码。
This vulnerability has been acknowledged by the User-Mode Linux team, and kernel memory protection should be fully implemented in a future version of the product. Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org .
User-Mode Linux Kernel 2.4.17 -8 Memory Access Vulnerability (EDBID:21248)
User-Mode Linux (UML) is a patch which allows the Linux Kernel to run as a user space process. It is currently available for the Linux operating system. It may be used as an efficient tool for kernel development, as well as for virtual networking, honeypots, and experimentation.
UML does not correctly protect kernel address space from user programs within the UML environment. It may be possible to execute arbitrary code within the kernel and gain root access. Additionally, it may be possible to use this vulnerability to escape the UML environment, leading to local access on the hosting system.
This is a known problem with the current UML implementation. Memory protection may be partially implemented at this time.