*** This bug is a security vulnerability ***
Public security bug reported:
The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel
before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly
handle an invalid value in the DS segment register, which allows guest
OS users to gain guest OS privileges via a crafted application.
Break-Fix: - 13d2b4d11d69a92574a55bfd985cfb0ca77aebdc
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Lucid)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Lucid)
Importance: Medium
Status: New
** Affects: linux-fsl-imx51 (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Lucid)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Lucid)
Importance: Medium
Status: New
** Affects: linux-lts-quantal (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Lucid)
Importance: Medium
Status: Invalid
** Affects: linux (Ubuntu Oneiric)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Oneiric)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Oneiric)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Oneiric)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Precise)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-mvl-dove (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Quantal)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Quantal)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Raring)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Raring)
Importance: Medium
Status: New
** Affects: linux-ec2 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Raring)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Raring)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Hardy)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-ec2 (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-lts-backport-natty (Ubuntu Hardy)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-oneiric (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Hardy)
Importance: Medium
Status: Invalid
** Tags: kernel-cve-tracking-bug
** Tags added: kernel-cve-tracking-bug
** Information type changed from Public to Public Security
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0228
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143796
Title:
CVE-2013-0228
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143796/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs