|
|
| |
|
| |
kernel: privilege escalation
| Package(s): | kernel |
CVE #(s): | CVE-2013-0268
|
| Created: | February 10, 2013 |
Updated: | March 15, 2013 |
| Description: |
The kernel's MSR register driver relied only upon filesystem-level access checks to restrict users who could write registers. As a result, the root user could access registers even if the capabilities that would ordinarily restrict such activity (CAP_SYS_RAWIO) had been dropped. The consequences are severe — execution of arbitrary code in kernel mode — but exploitation requires a process already running as root. |
| Alerts: |
|
( Log in to post comments)
|
|
|