CVE-2013-4368
17.10.2013, 23:55
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.Enginsight
Vendor | Product | Version |
---|---|---|
xen | xen | 𝑥 ≤ 4.3.0 |
xen | xen | 3.0.2 |
xen | xen | 3.0.3 |
xen | xen | 3.0.4 |
xen | xen | 3.1.3 |
xen | xen | 3.1.4 |
xen | xen | 3.2.0 |
xen | xen | 3.2.1 |
xen | xen | 3.2.2 |
xen | xen | 3.2.3 |
xen | xen | 3.3.0 |
xen | xen | 3.3.1 |
xen | xen | 3.3.2 |
xen | xen | 3.4.0 |
xen | xen | 3.4.1 |
xen | xen | 3.4.2 |
xen | xen | 3.4.3 |
xen | xen | 3.4.4 |
xen | xen | 4.0.0 |
xen | xen | 4.0.1 |
xen | xen | 4.0.2 |
xen | xen | 4.0.3 |
xen | xen | 4.0.4 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
xen | xen | 4.1.4 |
xen | xen | 4.1.5 |
xen | xen | 4.1.6.1 |
xen | xen | 4.2.0 |
xen | xen | 4.2.1 |
xen | xen | 4.2.2 |
xen | xen | 4.2.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References