Improper input validation in Linux kernel - CVE-2013-0190
Published: February 13, 2013 / Updated: March 8, 2013
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.
How to mitigate CVE-2013-0190
Sources
- http://rhn.redhat.com/errata/RHSA-2013-0496.html
- http://www.openwall.com/lists/oss-security/2013/01/16/6
- http://www.openwall.com/lists/oss-security/2013/01/16/8
- http://www.securityfocus.com/bid/57433
- http://www.ubuntu.com/usn/USN-1725-1
- http://www.ubuntu.com/usn/USN-1728-1
- https://bugzilla.redhat.com/show_bug.cgi?id=896038