First published: Sun Apr 05 2015(Updated: )
drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =3.4.0 | |
Xen xen-unstable | =3.4.1 | |
Xen xen-unstable | =3.4.2 | |
Xen xen-unstable | =3.4.3 | |
Xen xen-unstable | =3.4.4 | |
Linux Kernel | =2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0777 is considered to be of medium severity due to its potential for information disclosure.
To fix CVE-2015-0777, you should update to the latest version of the Xen hypervisor that addresses this vulnerability.
CVE-2015-0777 affects Xen versions 3.4.0 to 3.4.4 running on certain Linux distributions, specifically SUSE Linux.
CVE-2015-0777 is an information disclosure vulnerability that allows guest OS users to access uninitialized memory in the host OS.
CVE-2015-0777 cannot be exploited remotely as it requires access to the guest operating system.