Severity
2.1LOWNVD
EPSS
0.1%
top 76.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 12
Latest updateMay 14

Description

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.

CVSS vector

AV:L/AC:L/C:P/I:N/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.4.1-8 (bookworm)
Debianxen/xen< 4.4.1-8+3
NVDxen/xen33 versions+32

🔴Vulnerability Details

2
GHSA
GHSA-p925-cpg4-hv5v: The emulation routines for unspecified X86 devices in Xen 32022-05-14
OSV
CVE-2015-2044: The emulation routines for unspecified X86 devices in Xen 32015-03-12

📋Vendor Advisories

2
Red Hat
xen: information leak via internal x86 system device emulation (XSA-121)2015-03-06
Debian
CVE-2015-2044: xen - The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x do...2015

💬Community

1
Bugzilla
CVE-2015-2044 xen: information leak via internal x86 system device emulation (XSA-121)2015-02-23