Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 452582 (CVE-2013-0190) - Kernel : stack corruption in xen_failsafe_callback() (CVE-2013-0190)
Summary: Kernel : stack corruption in xen_failsafe_callback() (CVE-2013-0190)
Status: RESOLVED OBSOLETE
Alias: CVE-2013-0190
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-01-16 17:38 UTC by Agostino Sarubbo
Modified: 2018-04-04 18:27 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-01-16 17:38:06 UTC
From $URL :

A flaw was found in the way xen_failsafe_callback() handled failed iret,
which causes the stack pointer to be wrong when entering the
iret_exc error path. An unprivileged local guest user in the 32-bit PV
Xen domain could use this flaw to crash the guest.

References:
http://www.openwall.com/lists/oss-security/2013/01/16/6
Comment 1 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-04-04 18:27:38 UTC
There are no longer any 2.x kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security.