Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 516900

Summary: <sys-kernel/openvz-sources-2.6.32.90.5: ptrace SYSRET Path Privilege Escalation Vulnerability
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED OBSOLETE    
Severity: major CC: andreis.vinogradovs, proxy-maint, pva
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://secunia.com/advisories/59892/
See Also: https://bugs.gentoo.org/show_bug.cgi?id=528932
Whiteboard: B1 [noglsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2014-07-11 15:25:43 UTC
From ${URL} :

OpenVZ has issued an update for kernel. This fixes a vulnerability, which can be exploited by 
malicious, local users to gain escalated privileges.

For more information:
SA59633


Solution:
Update kernel branch RHEL6 to 042stab092.2.

Original Advisory:
OpenVZ:
http://wiki.openvz.org/Download/kernel/rhel6/042stab092.2


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2014-07-12 16:57:24 UTC
+  12 Jul 2014; Peter Volkov <pva@gentoo.org>
+  -openvz-sources-2.6.32.90.5.ebuild, openvz-sources-2.6.32.92.2.ebuild:
+  x86/amd64 stable, security bug #516900, thank Agostino Sarubbo for report.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-11-25 10:50:13 UTC
Over 2 years old.  Closing.