Summary: | <app-emulation/xen-{4.2.5-r9,4.4.2-r2,4.5.0-r6}: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) (CVE-2015-3340) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | xen |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://xenbits.xen.org/xsa/advisory-132.html | ||
Whiteboard: | B4 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
![]() fixed in tree, thanks app-emulation/xen-4.5.0-r6 app-emulation/xen-4.4.2-r2 app-emulation/xen-4.2.5-r9 request filed together with bug 549200 CVE-2015-3340 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340): Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. This issue was resolved and addressed in GLSA 201604-03 at https://security.gentoo.org/glsa/201604-03 by GLSA coordinator Yury German (BlueKnight). |