Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4355 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does affect the version of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.
This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.
Base Score | 2.3 |
---|---|
Base Metrics | AV:A/AC:M/Au:S/C:P/I:N/A:N |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 5 (kernel) | RHSA-2013:1790 | 2013-12-05 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | kernel-xen | Will not fix |