Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-4021

Опубликовано: 18 июн. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.7

Описание

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

РелизСтатусПримечание
devel

released

4.4.0-0ubuntu6
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.1]]
lucid

DNE

precise

released

4.1.6.1-0ubuntu0.12.04.2
saucy

released

4.3.0-1ubuntu1.4
trusty

released

4.4.0-0ubuntu5.1
trusty/esm

DNE

trusty was released [4.4.0-0ubuntu5.1]
upstream

needs-triage

utopic

released

4.4.0-0ubuntu6
vivid

released

4.4.0-0ubuntu6

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 46%
0.00234
Низкий

2.7 Low

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

nvd
около 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

debian
около 11 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered ...

github
около 3 лет назад

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

oracle-oval
почти 11 лет назад

ELSA-2014-0926: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 46%
0.00234
Низкий

2.7 Low

CVSS2