CVE-2012-0217
Published: 12 June 2012
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.1.3~rc1+hg-20120614.a9c0a89c08f2-2)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(4.1.3~rc1+hg-20120614.a9c0a89c08f2-4ubuntu1)
|
|
Patches: Vendor: http://www.debian.org/security/2012/dsa-2501 |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
tyhicks | HVM (fully-virtualised) and 32 bit PV guests are not affected Per AMD, their CPUs are not affected |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
- http://www.openwall.com/lists/oss-security/2012/06/12/1
- NVD
- Launchpad
- Debian