| Summary: | <sys-kernel/openvz-sources-2.6.32.90.5: ptrace SYSRET Path Privilege Escalation Vulnerability | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED OBSOLETE | ||
| Severity: | major | CC: | andreis.vinogradovs, proxy-maint, pva |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://secunia.com/advisories/59892/ | ||
| See Also: | https://bugs.gentoo.org/show_bug.cgi?id=528932 | ||
| Whiteboard: | B1 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
+ 12 Jul 2014; Peter Volkov <pva@gentoo.org> + -openvz-sources-2.6.32.90.5.ebuild, openvz-sources-2.6.32.92.2.ebuild: + x86/amd64 stable, security bug #516900, thank Agostino Sarubbo for report. Over 2 years old. Closing. |
From ${URL} : OpenVZ has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA59633 Solution: Update kernel branch RHEL6 to 042stab092.2. Original Advisory: OpenVZ: http://wiki.openvz.org/Download/kernel/rhel6/042stab092.2 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.