Description
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2501-1 | xen security update |
Debian DSA |
DSA-2508-1 | kfreebsd-8 security update |
References
History
No history.
Subscriptions
Citrix
Subscribe
Xenserver
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Illumos
Subscribe
Illumos
Subscribe
Joyent
Subscribe
Smartos
Subscribe
Microsoft
Subscribe
Windows 7
Subscribe
Windows Server 2003
Subscribe
Windows Server 2008
Subscribe
Windows Xp
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Sun
Subscribe
Sunos
Subscribe
Xen
Subscribe
Xen
Subscribe
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T18:16:19.831Z
Reserved: 2011-12-14T00:00:00.000Z
Link: CVE-2012-0217
No data.
Status : Deferred
Published: 2012-06-12T22:55:01.343
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0217
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA