Lucene search

K
freebsdFreeBSDEF9D041E-27E2-11E5-A4A5-002590263BF5
HistoryMar 05, 2015 - 12:00 a.m.

xen-kernel -- Information leak through version information hypercall

2015-03-0500:00:00
vuxml.freebsd.org
16

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

25.4%

The Xen Project reports:

The code handling certain sub-operations of the
HYPERVISOR_xen_version hypercall fails to fully initialize all
fields of structures subsequently copied back to guest memory. Due
to this hypervisor stack contents are copied into the destination of
the operation, thus becoming visible to the guest.
A malicious guest might be able to read sensitive data relating to
other guests.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxen-kernel< 4.5.0_3UNKNOWN

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

25.4%