Severity
1.5LOWNVD
EPSS
0.1%
top 73.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Latest updateJun 20

Description

Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.

CVSS vector

AV:L/AC:M/C:P/I:N/A:NExploitability: 2.7 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.4.0-1 (bookworm)
Debianxen/xen< 4.4.0-1+3
NVDxen/xen4.3.0+32

🔴Vulnerability Details

2
GHSA
GHSA-85vh-p875-9rm4: Xen 42022-05-17
OSV
CVE-2013-4355: Xen 42013-10-01

📋Vendor Advisories

3
Red Hat
kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe2024-06-20
Red Hat
Kernel: Xen: Xsa-63: information leak via I/O instruction emulation2013-09-30
Debian
CVE-2013-4355: xen - Xen 4.3.x and earlier does not properly handle certain errors, which allows loca...2013

💬Community

3
Bugzilla
CVE-2013-4355 CVE-2013-4356 CVE-2013-4361 xen: various flaws [fedora-all]2013-09-30
Bugzilla
CVE-2013-4355 Kernel: Xen: Xsa-63: information leak via I/O instruction emulation2013-09-18
Bugzilla
CVE-2011-4355 gdb: object file .debug_gdb_scripts section improper input validation2011-05-09