kernel: privilege escalation
Package(s): | kernel |
CVE #(s): | CVE-2012-0217
|
Created: | June 12, 2012 |
Updated: | July 23, 2012 |
Description: |
From the Red Hat advisory:
It was found that the Xen hypervisor implementation as shipped with Red
Hat Enterprise Linux 5 did not properly restrict the syscall return
addresses in the sysret return path to canonical addresses. An
unprivileged user in a 64-bit para-virtualized guest, that is running on a
64-bit host that has an Intel CPU, could use this flaw to crash the host
or, potentially, escalate their privileges, allowing them to execute
arbitrary code at the hypervisor level. |
Alerts: |
|