Unrated severityNVD Advisory· Published Mar 12, 2015· Updated May 6, 2026
CVE-2015-2151
CVE-2015-2151
Description
The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
Affected products
4- osv-coords4 versionspkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 4.4.1_10-9.1+ 3 more
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- xenbits.xen.org/xsa/advisory-123.htmlnvdPatchVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3181nvdThird Party Advisory
- www.securitytracker.com/id/1031806nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031903nvdThird Party AdvisoryVDB Entry
- kb.juniper.net/InfoCenter/indexnvd
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.htmlnvd
- support.citrix.com/article/CTX200484nvd
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvd
- www.securityfocus.com/bid/73015nvd
- www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htmnvd
- security.gentoo.org/glsa/201604-03nvd
News mentions
0No linked articles in our index yet.