An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.14.0 (including) | 4.14.0 (including) |
Xen | Xen | 4.15.0 (including) | 4.15.0 (including) |
Xen | Xen | 4.16.0 (including) | 4.16.0 (including) |
Xen | Xen | 4.17.0 (including) | 4.17.0 (including) |