| Summary: | Kernel : "xen_iret()" IRET Handling Denial of Service Weakness (CVE-2013-0228) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
| Status: | RESOLVED OBSOLETE | ||
| Severity: | normal | CC: | kernel |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://secunia.com/advisories/52071/ | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
Take a look also at xsa-38 http://www.openwall.com/lists/oss-security/2013/02/15/5 (In reply to comment #1) > Take a look also at xsa-38 > http://www.openwall.com/lists/oss-security/2013/02/15/5 Nevermind about this comment. The original issue for this bug regards the kernel instead of app-emulation/xen There are no longer any 2.x or <3.7.9 kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security. |
From ${URL} : Description A weakness has been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). The weakness is caused due to an error within "xen_iret()" when handling an IRET (Interrupt Return) and can be exploited to cause a crash. Successful exploitation requires that a 32-bit ParaVirtual OPerationS (PVOPS) guest is used. Solution Apply patch xsa42-pvops-0001-x86-xen-don-t-assume-ds-is-usable-in-xen_iret-for-32.patch Provided and/or discovered by Drew Jones Original Advisory XSA-42: http://www.openwall.com/lists/oss-security/2013/02/13/10