The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Linux |
|
Redhat |
|
Configuration 1 [-]
|
Package | CPE | Advisory | Released Date |
---|---|---|---|
Red Hat Enterprise Linux 6 | |||
kernel-0:2.6.32-358.2.1.el6 | cpe:/o:redhat:enterprise_linux:6 | RHSA-2013:0630 | 2013-03-12T00:00:00Z |
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published: 2013-03-01T11:00:00
Updated: 2024-08-06T14:18:09.563Z
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0228

No data.

Status : Deferred
Published: 2013-03-01T12:37:54.100
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0228
