Bug 1103646 (CVE-2014-4021)
Summary: | CVE-2014-4021 xen: Hypervisor heap contents leaked to guests (xsa-100) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | agordeev, dhoward, drjones, imammedo, jkurik, jrusnack, lwang, mrezanin, nobody, pbonzini, pholasek, plougher, rkrcmar, rvrbovsk, security-response-team, vkuznets |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was found that the Xen hypervisor implementation did not properly clean memory pages previously allocated by the hypervisor. A privileged guest user could potentially use this flaw to read data relating to other guests or the hypervisor itself.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-07-23 17:48:14 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1103648, 1103649, 1110316 | ||
Bug Blocks: | 1103651 |
Description
Petr Matousek
2014-06-02 09:32:19 UTC
Statement: (none) Now public via -- http://seclists.org/oss-sec/2014/q2/549 Created xen tracking bugs for this issue: Affects: fedora-all [bug 1110316] xen-4.2.4-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. xen-4.3.2-6.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0926 https://rhn.redhat.com/errata/RHSA-2014-0926.html IssueDescription: It was found that the Xen hypervisor implementation did not properly clean memory pages previously allocated by the hypervisor. A privileged guest user could potentially use this flaw to read data relating to other guests or the hypervisor itself. |