The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=896038 | |
http://rhn.redhat.com/errata/RHSA-2013-0496.html | vendor advisory |
http://www.ubuntu.com/usn/USN-1728-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-1725-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/01/16/6 | mailing list |
http://www.openwall.com/lists/oss-security/2013/01/16/8 | mailing list |
http://www.securityfocus.com/bid/57433 | vdb entry |