CVE-2015-2044
12.03.2015, 14:59
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.Enginsight
| Vendor | Product | Version |
|---|---|---|
| xen | xen | 3.2.0 |
| xen | xen | 3.2.1 |
| xen | xen | 3.2.2 |
| xen | xen | 3.2.3 |
| xen | xen | 3.3.0 |
| xen | xen | 3.3.1 |
| xen | xen | 3.3.2 |
| xen | xen | 3.4.0 |
| xen | xen | 3.4.1 |
| xen | xen | 3.4.2 |
| xen | xen | 3.4.3 |
| xen | xen | 3.4.4 |
| xen | xen | 4.0.0 |
| xen | xen | 4.0.1 |
| xen | xen | 4.0.2 |
| xen | xen | 4.0.3 |
| xen | xen | 4.0.4 |
| xen | xen | 4.1.0 |
| xen | xen | 4.1.1 |
| xen | xen | 4.1.2 |
| xen | xen | 4.1.3 |
| xen | xen | 4.1.4 |
| xen | xen | 4.1.5 |
| xen | xen | 4.1.6.1 |
| xen | xen | 4.2.0 |
| xen | xen | 4.2.1 |
| xen | xen | 4.2.2 |
| xen | xen | 4.2.3 |
| xen | xen | 4.3.0 |
| xen | xen | 4.3.1 |
| xen | xen | 4.4.0 |
| xen | xen | 4.4.0:rc1 |
| xen | xen | 4.4.1 |
| xen | xen | 4.5.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References