SB2013021307 - Improper input validation in Linux kernel
Published: February 13, 2013
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2013-0190)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.
Remediation
Install update from vendor's website.
References
- http://rhn.redhat.com/errata/RHSA-2013-0496.html
- http://www.openwall.com/lists/oss-security/2013/01/16/6
- http://www.openwall.com/lists/oss-security/2013/01/16/8
- http://www.securityfocus.com/bid/57433
- http://www.ubuntu.com/usn/USN-1725-1
- http://www.ubuntu.com/usn/USN-1728-1
- https://bugzilla.redhat.com/show_bug.cgi?id=896038