Red Hat Security Advisory 2012-1540-01

newsbot

newsbot

RSS Feed
Red Hat Security Advisory 2012-1540-01 - These packages contain the Linux kernel. A race condition in the way asynchronous I/O and fallocate() interacted when using ext4 could allow a local, unprivileged user to obtain random data from a deleted file. A flaw in the way the Xen hypervisor implementation range checked guest provided addresses in the XENMEM_exchange hypercall could allow a malicious, para-virtualized guest administrator to crash the hypervisor or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level.

Weiterlesen...
 

Ähnliche Themen

Red Hat Security Advisory 2012-1508-01

Red Hat Security Advisory 2012-1325-01

Red Hat Security Advisory 2012-1505-01

Red Hat Security Advisory 2012-1324-01

Red Hat Security Advisory 2012-1262-01

Zurück
Oben