Information

AdvisoryXSA-40
Public release 2013-01-16 14:50
Updated 2023-12-15 15:35
Version 2
CVE(s) CVE-2013-0190
Title Linux stack corruption in xen_failsafe_callback for 32bit PVOPS guests.

Files

advisory-40.txt (signed advisory file)
xsa40.patch

Advisory


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

             Xen Security Advisory CVE-2013-0190 / XSA-40
                               version 2

 Linux stack corruption in xen_failsafe_callback for 32bit PVOPS guests.

UPDATES IN VERSION 2
====================

Normalize version tags

ISSUE DESCRIPTION
=================

xen_failsafe_callback incorrectly sets up its stack if an iret fault is
injected by the hypervisor.

IMPACT
======

Malicious or buggy unprivileged userspace can cause the guest kernel to
crash, or operate erroneously.

VULNERABLE SYSTEMS
==================

All 32bit PVOPS versions of Linux are affected, since the introduction
of Xen PVOPS support in 2.6.23.  Classic-Xen kernels are not vulnerable.

MITIGATION
==========

This can be mitigated by not running 32bit PVOPS Linux guests.

32bit classic-Xen guests, all 64bit PV guests and all HVM guests are
unaffected.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa40.patch  Linux

$ sha256sum xsa40*.patch
b6aa67b4605f6088f757ca28093d265c71e456906619d81d129bf656944ed721  xsa40.patch
$
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmV8b+cMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ8+AH/A/p6PbxIMKcrs2uuqPiYGtvyOulY0+JeOVZmWAA
APiFsbAHUAAV2+re+pSre2crn9ajNZ3cuAv/ZIMm+ID8NLspn9HlhVl7cBnPOBUX
RWaQ1gZFhnTWjTyLGr5g+SWFEwJzbRiN3dNb8ySsL3XzYOc0nG5lwRNNsxy0uvus
fFvlQ0qlGZ9zXCp9xKTYC9wdYZYLEnvVc16PW/75susDj9q0EvnJuklo1LZp9wdw
HP/gG7GzVzkw8ybR5wXCMqLHdKqHa7Np6tP4/ITers2nwPQEE4UE3/YK/eEj9yF7
OyWu4JaLtkDs3j2q7zw/Ut6yf9Eia0bRA/rEvC3cKR6eE1k=
=bM20
-----END PGP SIGNATURE-----


Xenproject.org Security Team