CVE-2015-2044
Published: 12 March 2015
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
Priority
Status
Package | Release | Status |
---|---|---|
xen-3.3 Launchpad, Ubuntu, Debian |
utopic |
Does not exist
|
vivid |
Does not exist
|
|
upstream |
Ignored
(end of life)
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa121.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen Launchpad, Ubuntu, Debian |
upstream |
Needed
|
lucid |
Does not exist
|
|
precise |
Released
(4.1.6.1-0ubuntu0.12.04.5)
|
|
trusty |
Released
(4.4.1-0ubuntu0.14.04.4)
|
|
utopic |
Released
(4.4.1-0ubuntu0.14.10.4)
|
|
vivid |
Released
(4.5.0-1ubuntu3)
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa121.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |