SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen Transitive Grant Processing Flaws Let Local Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1039178
SecurityTracker URL:  http://securitytracker.com/id/1039178
CVE Reference:   CVE-2017-12135   (Links to External Site)
Date:  Aug 16 2017
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.5.x, 4.6.x, 4.7.x, 4.8.x, 4.9.x
Description:   A vulnerability was reported in Xen. A local user on the guest system can gain elevated privileges on the host system.

A local user on the guest system can exploit flaws in the processing of transitive grants to gain elevated privileges on the host system.

The retry logic on copy operations is affected.

The reference counting and locking logic is also affected.

Jan Beulich of SUSE reported this vulnerability.

Impact:   A local user on the guest system can gain elevated privileges on the host system.
Solution:   The vendor has issued a fix (xsa226-4.5.patch, xsa226-4.6.patch, xsa226-4.7.patch, and xsa226.patch).

The vendor advisory is available at:

https://xenbits.xen.org/xsa/advisory-226.html

Vendor URL:  xenbits.xen.org/xsa/advisory-226.html (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 22 2017 (Citrix Issues Fix for Citrix XenServer) Xen Transitive Grant Processing Flaws Let Local Users on a Guest System Gain Elevated Privileges on the Host System
Citrix has issued a fix for Citrix XenServer.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC