Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2044

Опубликовано: 12 мар. 2015
Источник: debian
EPSS Низкий

Описание

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.4.1-8package
xenend-of-lifesqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-121.html

EPSS

Процентиль: 24%
0.00082
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

redhat
почти 11 лет назад

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

nvd
почти 11 лет назад

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

github
больше 3 лет назад

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

suse-cvrf
почти 11 лет назад

Security update for Xen

EPSS

Процентиль: 24%
0.00082
Низкий