First published: Tue Apr 28 2015(Updated: )
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.2.4 | |
Xen xen-unstable | =4.2.5 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.3.2 | |
Xen xen-unstable | =4.3.3 | |
Xen xen-unstable | =4.3.4 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.1 | |
Xen xen-unstable | =4.4.2 | |
Xen xen-unstable | =4.5.0 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
SUSE Linux Enterprise Desktop | =11.0-sp3 | |
SUSE Linux Enterprise Server | =11.0-sp3 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 | |
Debian | =7.0 | |
Debian | =8.0 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Server | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-3340 is classified as high due to its potential to expose sensitive memory information to unauthorized remote service domains.
To fix CVE-2015-3340, update your Xen installation to the latest version that addresses this vulnerability.
Versions of Xen affected by CVE-2015-3340 include 4.2.x through 4.5.x, specifically versions 4.2.0 to 4.5.0.
CVE-2015-3340 can lead to unauthorized access to sensitive information stored in memory, impacting the confidentiality of virtualized environments.
No, CVE-2015-3340 is not a remote code execution vulnerability; it allows information disclosure from memory instead.