The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-103-1 | linux-2.6 security update |
EUVD |
EUVD-2013-0262 | The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application. |
Ubuntu USN |
USN-1756-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1760-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1767-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1778-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1781-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1795-1 | Linux kernel (Quantal HWE) vulnerabilities |
Ubuntu USN |
USN-1796-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1797-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1805-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1808-1 | Linux kernel (EC2) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T14:18:09.563Z
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0228
No data.
Status : Deferred
Published: 2013-03-01T12:37:54.100
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0228
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN