Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-4021

Опубликовано: 18 июн. 2014
Источник: debian
EPSS Низкий

Описание

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.4.1-1package
xenend-of-lifesqueezepackage

EPSS

Процентиль: 46%
0.00234
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

redhat
больше 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

nvd
больше 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

github
больше 3 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

oracle-oval
больше 11 лет назад

ELSA-2014-0926: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 46%
0.00234
Низкий
Уязвимость CVE-2014-4021