Xen 4.3.x and previous versions does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen 3.2.0 |
||
xen xen 4.1.5 |
||
xen xen 3.2.1 |
||
xen xen 4.2.2 |
||
xen xen 4.2.3 |
||
xen xen 3.0.4 |
||
xen xen 3.4.0 |
||
xen xen 4.0.4 |
||
xen xen 4.0.2 |
||
xen xen 3.3.2 |
||
xen xen 4.1.2 |
||
xen xen 3.2.2 |
||
xen xen 3.4.4 |
||
xen xen 4.0.0 |
||
xen xen 4.1.1 |
||
xen xen 4.2.0 |
||
xen xen 4.1.0 |
||
xen xen 3.4.3 |
||
xen xen 3.0.3 |
||
xen xen 4.1.3 |
||
xen xen 3.2.3 |
||
xen xen 3.3.1 |
||
xen xen 3.0.2 |
||
xen xen 3.4.2 |
||
xen xen 4.1.4 |
||
xen xen 3.4.1 |
||
xen xen 3.1.4 |
||
xen xen |
||
xen xen 3.3.0 |
||
xen xen 4.2.1 |
||
xen xen 3.1.3 |
||
xen xen 4.0.1 |
||
xen xen 4.0.3 |