First published: Tue May 21 2013(Updated: )
Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possibly have other impacts via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.0.1 | |
Xen xen-unstable | =4.0.2 | |
Xen xen-unstable | =4.0.3 | |
Xen xen-unstable | =4.0.4 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1964 is classified as a moderate severity vulnerability due to its potential to cause denial of service and expose sensitive information.
To fix CVE-2013-1964, upgrade to a patched version of Xen that addresses this vulnerability.
CVE-2013-1964 affects Xen versions 4.0.0 through 4.1.5.
Yes, CVE-2013-1964 can potentially cause a host crash through denial of service.
Local guest administrators using affected versions of Xen could exploit CVE-2013-1964, impacting the host system.