First published: Wed Jun 18 2014(Updated: )
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =3.2.0 | |
Xen xen-unstable | =3.2.1 | |
Xen xen-unstable | =3.2.2 | |
Xen xen-unstable | =3.2.3 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.0.1 | |
Xen xen-unstable | =4.0.2 | |
Xen xen-unstable | =4.0.3 | |
Xen xen-unstable | =4.0.4 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.1.6.1 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4021 allows local guest OS users to potentially access sensitive information from memory pages not properly cleaned.
CVE-2014-4021 affects Xen versions 3.2.0 through 4.4.0, including various sub-versions.
Mitigation for CVE-2014-4021 involves updating to a patched version of Xen that addresses the memory page cleaning issue.
CVE-2014-4021 is a local vulnerability, requiring access to the guest operating system.
If using a vulnerable version, you should upgrade to a non-vulnerable version of Xen as soon as possible to secure your system.