The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
https://security.gentoo.org/glsa/201504-04
http://support.citrix.com/article/CTX200484
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm
http://www.debian.org/security/2015/dsa-3181
http://www.securitytracker.com/id/1031806