|
|
| |
|
| |
kernel: privilege escalation
| Package(s): | kernel |
CVE #(s): | CVE-2012-5513
|
| Created: | December 5, 2012 |
Updated: | December 24, 2012 |
| Description: |
From the Red Hat advisory:
A flaw in the way the Xen hypervisor implementation range checked guest
provided addresses in the XENMEM_exchange hypercall could allow a
malicious, para-virtualized guest administrator to crash the hypervisor or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the hypervisor level. |
| Alerts: |
|
( Log in to post comments)
|
|
|