The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4368 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 2.3 |
---|---|
Base Metrics | AV:A/AC:M/Au:S/C:P/I:N/A:N |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 5 (kernel) | RHSA-2013:1449 | 2013-10-22 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | kernel-xen | Will not fix |