CVE-2015-2151
12.03.2015, 14:59
The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 7.0 |
xen | xen | 3.2.0 |
xen | xen | 3.2.1 |
xen | xen | 3.2.2 |
xen | xen | 3.2.3 |
xen | xen | 3.3.0 |
xen | xen | 3.3.1 |
xen | xen | 3.3.2 |
xen | xen | 3.4.0 |
xen | xen | 3.4.1 |
xen | xen | 3.4.2 |
xen | xen | 3.4.3 |
xen | xen | 3.4.4 |
xen | xen | 4.0.0 |
xen | xen | 4.0.1 |
xen | xen | 4.0.2 |
xen | xen | 4.0.3 |
xen | xen | 4.0.4 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
xen | xen | 4.1.4 |
xen | xen | 4.1.5 |
xen | xen | 4.1.6.1 |
xen | xen | 4.2.0 |
xen | xen | 4.2.1 |
xen | xen | 4.2.2 |
xen | xen | 4.2.3 |
xen | xen | 4.3.0 |
xen | xen | 4.3.1 |
xen | xen | 4.4.0 |
xen | xen | 4.4.0:rc1 |
xen | xen | 4.4.1 |
xen | xen | 4.5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References