User: Password:
Subscribe / Log in / New account

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2012-5513
Created:December 5, 2012 Updated:December 24, 2012
Description: From the Red Hat advisory:

A flaw in the way the Xen hypervisor implementation range checked guest provided addresses in the XENMEM_exchange hypercall could allow a malicious, para-virtualized guest administrator to crash the hypervisor or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level.

SUSE SUSE-SU-2014:0470-1 Xen 2014-04-01
SUSE SUSE-SU-2014:0446-1 Xen 2014-03-25
Gentoo 201309-24 xen 2013-09-27
openSUSE openSUSE-SU-2013:0637-1 xen 2013-04-08
openSUSE openSUSE-SU-2013:0636-1 xen 2013-04-08
openSUSE openSUSE-SU-2013:0133-1 xen 2013-01-23
openSUSE openSUSE-SU-2012:1687-1 xen 2012-12-23
openSUSE openSUSE-SU-2012:1685-1 xen 2012-12-23
Debian DSA-2582-1 xen 2012-12-07
Oracle ELSA-2012-1540 kernel 2012-12-05
Scientific Linux SL-kern-20121206 kernel 2012-12-06
SUSE SUSE-SU-2012:1615-1 Xen 2012-12-06
SUSE SUSE-SU-2012:1606-1 Xen 2012-12-04
CentOS CESA-2012:1540 kernel 2012-12-05
Red Hat RHSA-2012:1540-01 kernel 2012-12-04

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds