CVE-2014-4021
Published: 18 June 2014
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [4.4.0-0ubuntu5.1])
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Ignored
(reached end-of-life)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
mdeslaur | This is XSA-100 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
- http://xenbits.xen.org/xsa/advisory-100.html
- NVD
- Launchpad
- Debian