First published: Wed Aug 28 2013(Updated: )
Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possibly gain privileges via unspecified vectors.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1432 has a CVSS score indicating a high severity due to potential for denial of service and privilege escalation.
Fix CVE-2013-1432 by upgrading to a patched version of Xen that addresses the vulnerability.
Xen versions 4.1.0 to 4.2.2 are affected by CVE-2013-1432.
CVE-2013-1432 can lead to denial of service or possible privilege escalation for local PV guest kernels.
Local users running PV guest kernels on affected Xen versions are at risk due to CVE-2013-1432.