CVE-2015-2044
12.03.2015, 14:59
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.Enginsight
Vendor | Product | Version |
---|---|---|
xen | xen | 3.2.0 |
xen | xen | 3.2.1 |
xen | xen | 3.2.2 |
xen | xen | 3.2.3 |
xen | xen | 3.3.0 |
xen | xen | 3.3.1 |
xen | xen | 3.3.2 |
xen | xen | 3.4.0 |
xen | xen | 3.4.1 |
xen | xen | 3.4.2 |
xen | xen | 3.4.3 |
xen | xen | 3.4.4 |
xen | xen | 4.0.0 |
xen | xen | 4.0.1 |
xen | xen | 4.0.2 |
xen | xen | 4.0.3 |
xen | xen | 4.0.4 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
xen | xen | 4.1.4 |
xen | xen | 4.1.5 |
xen | xen | 4.1.6.1 |
xen | xen | 4.2.0 |
xen | xen | 4.2.1 |
xen | xen | 4.2.2 |
xen | xen | 4.2.3 |
xen | xen | 4.3.0 |
xen | xen | 4.3.1 |
xen | xen | 4.4.0 |
xen | xen | 4.4.0:rc1 |
xen | xen | 4.4.1 |
xen | xen | 4.5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References