Information Exposure Affecting xen package, versions <4.4.0-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-XEN-5701162
  • published1 Oct 2013
  • disclosed1 Oct 2013

Introduced: 1 Oct 2013

CVE-2013-4361  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:13 xen to version 4.4.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen package and not the xen package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

CVSS Scores

version 3.1