Xen 3.2.x up to and including 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen 4.0.0 |
||
xen xen 4.0.1 |
||
xen xen 4.1.3 |
||
xen xen 4.1.4 |
||
xen xen 4.3.0 |
||
xen xen 4.3.1 |
||
xen xen 4.0.2 |
||
xen xen 4.0.3 |
||
xen xen 4.1.5 |
||
xen xen 4.1.6.1 |
||
xen xen 4.4.0 |
||
xen xen 4.0.4 |
||
xen xen 4.1.0 |
||
xen xen 4.2.0 |
||
xen xen 4.2.1 |
||
xen xen 3.2.0 |
||
xen xen 3.2.1 |
||
xen xen 4.1.1 |
||
xen xen 4.1.2 |
||
xen xen 4.2.2 |
||
xen xen 4.2.3 |
||
xen xen 3.2.2 |
||
xen xen 3.2.3 |