UBUNTU-CVE-2014-4021

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2014-4021
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-4021.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-4021
Related
Published
2014-06-18T19:55:00Z
Modified
2014-06-18T19:55:00Z
Summary
[none]
Details

Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.

References

Affected packages

Ubuntu:14.04:LTS / xen

Package

Name
xen
Purl
pkg:deb/ubuntu/xen@4.4.0-0ubuntu5.1?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-0ubuntu5.1

Affected versions

4.*

4.3.0-1ubuntu1
4.3.0-1ubuntu2
4.3.0-1ubuntu3
4.3.0-1ubuntu4
4.3.0-1ubuntu5
4.4.0-0ubuntu3
4.4.0-0ubuntu4
4.4.0-0ubuntu5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libxenstore3.0": "4.4.0-0ubuntu5.1",
            "libxen-4.4": "4.4.0-0ubuntu5.1",
            "libxen-ocaml-dev": "4.4.0-0ubuntu5.1",
            "libxen-dev": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.3-amd64": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.3-armhf": "4.4.0-0ubuntu5.1",
            "xen-system-amd64": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.4-arm64": "4.4.0-0ubuntu5.1",
            "libxen-ocaml": "4.4.0-0ubuntu5.1",
            "xenstore-utils": "4.4.0-0ubuntu5.1",
            "xen-system-armhf": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.1-amd64": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.4-armhf": "4.4.0-0ubuntu5.1",
            "xen-hypervisor-4.4-amd64": "4.4.0-0ubuntu5.1",
            "xen-utils-common": "4.4.0-0ubuntu5.1",
            "xen-utils-4.4": "4.4.0-0ubuntu5.1",
            "xen-system-arm64": "4.4.0-0ubuntu5.1"
        }
    ]
}