|
|
Subscribe / Log in / New account

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2012-0217
Created:June 12, 2012 Updated:July 23, 2012
Description: From the Red Hat advisory:

It was found that the Xen hypervisor implementation as shipped with Red Hat Enterprise Linux 5 did not properly restrict the syscall return addresses in the sysret return path to canonical addresses. An unprivileged user in a 64-bit para-virtualized guest, that is running on a 64-bit host that has an Intel CPU, could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level.

Alerts:
Gentoo 201309-24 xen 2013-09-27
Debian DSA-2508-1 kfreebsd-8 2012-07-22
openSUSE openSUSE-SU-2012:0886-1 xen 2012-07-18
Fedora FEDORA-2012-9430 xen 2012-06-26
Fedora FEDORA-2012-9399 xen 2012-06-26
Fedora FEDORA-2012-9386 xen 2012-06-26
Debian DSA-2501-1 xen 2012-06-24
Scientific Linux SL-kern-20120613 kernel 2012-06-13
CentOS CESA-2012:0721 kernel 2012-06-13
Red Hat RHSA-2012:0721-01 kernel 2012-06-12
Red Hat RHSA-2012:0720-01 kernel 2012-06-12
SUSE SUSE-SU-2012:0730-1 Xen 2012-06-12
Oracle ELSA-2012-0721 kernel 2012-06-15

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds