CVE-2012-0217

Publication date 12 June 2012

Last updated 24 July 2024


Ubuntu priority

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
xen 13.10 saucy
Not affected
13.04 raring
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Fixed 4.1.2-2ubuntu2.1
11.10 oneiric
Fixed 4.1.1-2ubuntu4.2
11.04 natty Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release
xen-3.1 13.10 saucy Not in release
13.04 raring Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Ignored end of life
xen-3.2 13.10 saucy Not in release
13.04 raring Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy
Fixed 3.2.0-0ubuntu10.2
xen-3.3 13.10 saucy Not in release
13.04 raring Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Ignored end of life
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Not in release

Notes


tyhicks

HVM (fully-virtualised) and 32 bit PV guests are not affected Per AMD, their CPUs are not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
xen