From: | "Tóth Attila" <atoth@××××××××××.hu> |
---|---|
To: | gentoo-hardened@l.g.o |
Subject: | [gentoo-hardened] SYSRET 64bit Intel-only vulnerability |
Date: | Wed, 13 Jun 2012 21:02:47 |
Message-Id: | d3fc219798f2e78e60286e9ce4c6233a.squirrel@atoth.sote.hu |
1 | Possible local privilege escalation or guest-to-host VM escape. |
2 | http://www.kb.cert.org/vuls/id/649219 |
3 | |
4 | OpenBSD is not affected. |
5 | http://marc.info/?l=openbsd-misc&m=133957486127897&w=2 |
6 | |
7 | I wonder what will be the case with Gentoo and - especially - Hardened |
8 | kernels? |
9 | |
10 | This has been removed from the CERT's page: |
11 | http://hup.hu/cikkek/20120613/sysret_64_bites_opereracios_rendszer_privilege_escalation_sebezhetoseg_intel_cpu-s_hardveren#comment-1469883 |
12 | |
13 | Regards: |
14 | Dw. |
15 | -- |
16 | dr Tóth Attila, Radiológus, 06-20-825-8057 |
17 | Attila Toth MD, Radiologist, +36-20-825-8057 |
Subject | Author |
---|---|
Re: [gentoo-hardened] SYSRET 64bit Intel-only vulnerability | "Anthony G. Basile" <blueness@g.o> |