CVE-2013-4369
Published: 17 October 2013
The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration.
Notes
Author | Note |
---|---|
jdstrand | per upstream, "The only known user of this library is the xl toolstack which does not have a central long running daemon and therefore the impact is limited to crashing the process which is creating the domain, which exists only to service a single domain." |
mdeslaur | This is XSA-68 |
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
(code not present)
|
|
quantal |
Not vulnerable
(code not present)
|
|
raring |
Released
(4.2.2-0ubuntu0.13.04.2)
|
|
saucy |
Released
(4.3.0-1ubuntu1.1)
|
|
upstream |
Needs triage
|
|
xen-3.3 Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(code not present)
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
upstream |
Ignored
(end of life)
|