Vulnerability & Exploit Database

Displaying all 8 entries

Results for: CVE-2013-4368 Back to search

SUSE Linux Security Vulnerability: CVE-2013-4368 Vulnerability

  • Severity: 2
  • Published: October 17, 2013

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

Gentoo Linux: CVE-2013-4368: Xen: Multiple Vunlerabilities Vulnerability

  • Severity: 2
  • Published: October 17, 2013

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

Cent OS: CVE-2013-4368: CESA-2013:1449 (kernel) Vulnerability

  • Severity: 2
  • Published: October 17, 2013

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

RHSA-2013:1449: kernel security and bug fix update Vulnerability

  • Severity: 6
  • Published: October 10, 2013

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Fujitsu for reporting CVE-2013-4299, StephanMueller for reporting CVE-2013-4345, and the Xen project for reportingCVE-2013-4368.This update also fixes the following bug:All kernel users are advised to upgrade to these updated p...

DSA-3006-1 xen -- security update Vulnerability

  • Severity: 7
  • Published: August 28, 2013

The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.