First published: Wed Oct 09 2013(Updated: )
Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4356 has a high severity rating due to its potential to cause denial of service in affected systems.
To fix CVE-2013-4356, upgrade to a patched version of Xen that addresses this vulnerability.
CVE-2013-4356 specifically affects Xen version 4.3.0.
CVE-2013-4356 can allow local 64-bit PV guests to access invalid memory, potentially leading to system crashes.
Currently, the recommended approach for CVE-2013-4356 is to apply available patches rather than relying on workarounds.