CVE-2013-4355
Published: 1 October 2013
Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
Notes
Author | Note |
---|---|
mdeslaur | this is xsa-63 |
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Released
(4.1.5-0ubuntu0.12.04.2)
|
|
quantal |
Released
(4.1.5-0ubuntu0.12.10.2)
|
|
raring |
Released
(4.2.2-0ubuntu0.13.04.2)
|
|
saucy |
Released
(4.3.0-1ubuntu1.1)
|
|
upstream |
Needs triage
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
upstream |
Ignored
(end of life)
|
|
Binaries built from this source package are in Universe and so are supported by the community. |