The emulation routines for unspecified X86 devices in Xen 3.2.x up to and including 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen 4.4.0 |
||
xen xen 3.4.0 |
||
xen xen 3.4.1 |
||
xen xen 4.0.3 |
||
xen xen 4.0.4 |
||
xen xen 4.1.6.1 |
||
xen xen 4.2.0 |
||
xen xen 4.4.1 |
||
xen xen 4.5.0 |
||
xen xen 3.2.0 |
||
xen xen 3.2.1 |
||
xen xen 3.2.2 |
||
xen xen 3.4.2 |
||
xen xen 3.4.3 |
||
xen xen 4.1.0 |
||
xen xen 4.1.1 |
||
xen xen 4.2.1 |
||
xen xen 4.2.2 |
||
xen xen 4.2.3 |
||
xen xen 3.3.1 |
||
xen xen 3.3.2 |
||
xen xen 4.0.1 |
||
xen xen 4.0.2 |
||
xen xen 4.1.4 |
||
xen xen 4.1.5 |
||
xen xen 3.2.3 |
||
xen xen 3.3.0 |
||
xen xen 3.4.4 |
||
xen xen 4.0.0 |
||
xen xen 4.1.2 |
||
xen xen 4.1.3 |
||
xen xen 4.3.0 |
||
xen xen 4.3.1 |