Описание
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 4.4.0-0ubuntu6 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.1]] |
lucid | DNE | |
precise | released | 4.1.6.1-0ubuntu0.12.04.2 |
saucy | released | 4.3.0-1ubuntu1.4 |
trusty | released | 4.4.0-0ubuntu5.1 |
trusty/esm | DNE | trusty was released [4.4.0-0ubuntu5.1] |
upstream | needs-triage | |
utopic | released | 4.4.0-0ubuntu6 |
vivid | released | 4.4.0-0ubuntu6 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
lucid | ignored | end of life |
precise | DNE | |
saucy | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | ignored | end of life |
utopic | DNE | |
vivid | DNE |
Показывать по
EPSS
2.7 Low
CVSS2
Связанные уязвимости
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered ...
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
ELSA-2014-0926: kernel security and bug fix update (MODERATE)
EPSS
2.7 Low
CVSS2