Total vulnerabilities in the database
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
Software | From | Fixed in |
---|---|---|
xen / xen | 4.3.2 | 4.3.2.x |
xen / xen | 4.6.0 | 4.6.0.x |
xen / xen | 4.1.5 | 4.1.5.x |
xen / xen | 4.2.2 | 4.2.2.x |
xen / xen | 4.7.0 | 4.7.0.x |
xen / xen | 4.5.5 | 4.5.5.x |
xen / xen | 4.2.3 | 4.2.3.x |
xen / xen | 4.3.3 | 4.3.3.x |
xen / xen | 3.4.0 | 3.4.0.x |
xen / xen | 4.3.0 | 4.3.0.x |
xen / xen | 4.0.4 | 4.0.4.x |
xen / xen | 4.0.2 | 4.0.2.x |
xen / xen | 4.6.3 | 4.6.3.x |
xen / xen | 3.3.2 | 3.3.2.x |
xen / xen | 4.1.2 | 4.1.2.x |
xen / xen | 4.5.2 | 4.5.2.x |
xen / xen | 4.4.2 | 4.4.2.x |
xen / xen | 4.4.4 | 4.4.4.x |
xen / xen | 3.4.4 | 3.4.4.x |
xen / xen | 4.0.0 | 4.0.0.x |
xen / xen | 4.4.3 | 4.4.3.x |
xen / xen | 4.1.1 | 4.1.1.x |
xen / xen | 4.2.0 | 4.2.0.x |
xen / xen | 4.1.0 | 4.1.0.x |
xen / xen | 3.4.3 | 3.4.3.x |
xen / xen | 4.1.6 | 4.1.6.x |
xen / xen | 4.5.3 | 4.5.3.x |
xen / xen | 4.2.5 | 4.2.5.x |
xen / xen | 4.1.3 | 4.1.3.x |
xen / xen | 4.1.6.1 | 4.1.6.1.x |
xen / xen | 4.3.4 | 4.3.4.x |
xen / xen | 4.5.1 | 4.5.1.x |
xen / xen | 3.3.1 | 3.3.1.x |
xen / xen | 4.2.4 | 4.2.4.x |
xen / xen | 3.4.2 | 3.4.2.x |
xen / xen | 4.1.4 | 4.1.4.x |
xen / xen | 3.4.1 | 3.4.1.x |
xen / xen | 4.4.1 | 4.4.1.x |
xen / xen | 4.3.1 | 4.3.1.x |
xen / xen | 3.3.0 | 3.3.0.x |
xen / xen | 4.2.1 | 4.2.1.x |
xen / xen | 4.5.0 | 4.5.0.x |
xen / xen | 4.4.0 | 4.4.0.x |
xen / xen | 4.0.1 | 4.0.1.x |
xen / xen | 4.0.3 | 4.0.3.x |