Information
Advisory | XSA-40 |
Public release | 2013-01-16 14:50 |
Updated | 2023-12-15 15:35 |
Version | 2 |
CVE(s) | CVE-2013-0190 |
Title | Linux stack corruption in xen_failsafe_callback for 32bit PVOPS guests. |
Files
advisory-40.txt (signed advisory file)
xsa40.patch
Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Xen Security Advisory CVE-2013-0190 / XSA-40
version 2
Linux stack corruption in xen_failsafe_callback for 32bit PVOPS guests.
UPDATES IN VERSION 2
====================
Normalize version tags
ISSUE DESCRIPTION
=================
xen_failsafe_callback incorrectly sets up its stack if an iret fault is
injected by the hypervisor.
IMPACT
======
Malicious or buggy unprivileged userspace can cause the guest kernel to
crash, or operate erroneously.
VULNERABLE SYSTEMS
==================
All 32bit PVOPS versions of Linux are affected, since the introduction
of Xen PVOPS support in 2.6.23. Classic-Xen kernels are not vulnerable.
MITIGATION
==========
This can be mitigated by not running 32bit PVOPS Linux guests.
32bit classic-Xen guests, all 64bit PV guests and all HVM guests are
unaffected.
RESOLUTION
==========
Applying the appropriate attached patch resolves this issue.
xsa40.patch Linux
$ sha256sum xsa40*.patch
b6aa67b4605f6088f757ca28093d265c71e456906619d81d129bf656944ed721 xsa40.patch
$
-----BEGIN PGP SIGNATURE-----
iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmV8b+cMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ8+AH/A/p6PbxIMKcrs2uuqPiYGtvyOulY0+JeOVZmWAA
APiFsbAHUAAV2+re+pSre2crn9ajNZ3cuAv/ZIMm+ID8NLspn9HlhVl7cBnPOBUX
RWaQ1gZFhnTWjTyLGr5g+SWFEwJzbRiN3dNb8ySsL3XzYOc0nG5lwRNNsxy0uvus
fFvlQ0qlGZ9zXCp9xKTYC9wdYZYLEnvVc16PW/75susDj9q0EvnJuklo1LZp9wdw
HP/gG7GzVzkw8ybR5wXCMqLHdKqHa7Np6tP4/ITers2nwPQEE4UE3/YK/eEj9yF7
OyWu4JaLtkDs3j2q7zw/Ut6yf9Eia0bRA/rEvC3cKR6eE1k=
=bM20
-----END PGP SIGNATURE-----
Xenproject.org Security Team