Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running “under memory
pressure” and the Xen Security Module (XSM) is enabled, uses the wrong
ordering of operations when extending the per-domain event channel tracking
table, which causes a use-after-free and allows local guest kernels to
inject arbitrary events and gain privileges via unspecified vectors.
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |
lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
osvdb.org/92050
secunia.com/advisories/52857
www.openwall.com/lists/oss-security/2013/04/04/7
www.securitytracker.com/id/1028388
xforce.iss.net/xforce/xfdb/83226
launchpad.net/bugs/cve/CVE-2013-1920
nvd.nist.gov/vuln/detail/CVE-2013-1920
security-tracker.debian.org/tracker/CVE-2013-1920
www.cve.org/CVERecord?id=CVE-2013-1920