LWN.net Logo

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2012-5513
Created:December 5, 2012 Updated:December 24, 2012
Description: From the Red Hat advisory:

A flaw in the way the Xen hypervisor implementation range checked guest provided addresses in the XENMEM_exchange hypercall could allow a malicious, para-virtualized guest administrator to crash the hypervisor or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level.

Alerts:
Red Hat RHSA-2012:1540-01 2012-12-04
CentOS CESA-2012:1540 2012-12-05
SUSE SUSE-SU-2012:1606-1 2012-12-04
SUSE SUSE-SU-2012:1615-1 2012-12-06
Scientific Linux SL-kern-20121206 2012-12-06
Oracle ELSA-2012-1540 2012-12-05
Debian DSA-2582-1 2012-12-07
openSUSE openSUSE-SU-2012:1685-1 2012-12-23
openSUSE openSUSE-SU-2012:1687-1 2012-12-23
openSUSE openSUSE-SU-2013:0133-1 2013-01-23
openSUSE openSUSE-SU-2013:0636-1 2013-04-08
openSUSE openSUSE-SU-2013:0637-1 2013-04-08

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds