First published: Wed Jan 16 2013(Updated: )
A flaw was found in the way xen_failsafe_callback() handled failed iret, which causes the stack pointer to be wrong when entering the iret_exc error path. An unprivileged local guest user in the 32-bit PV Xen domain could use this flaw to crash the guest. References: <a href="http://www.openwall.com/lists/oss-security/2013/01/16/6">http://www.openwall.com/lists/oss-security/2013/01/16/6</a> Acknowledgements: Red Hat would like to thank the Andrew Cooper of Citrix for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.6.23 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.