First published: Tue Mar 10 2015(Updated: )
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.66-1 6.1.52-1 6.5.13-1 6.6.8-1 | |
Xen xen-unstable | ||
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8553 has a medium severity rating due to potential information disclosure risks.
To fix CVE-2015-8553, update the affected software packages to the latest versions provided by the vendors.
CVE-2015-8553 affects specific versions of the Linux package, Xen, and Red Hat Enterprise Linux 5.
Yes, CVE-2015-8553 allows guest OS users to obtain sensitive information from uninitialized locations in the host OS kernel memory.
Yes, CVE-2015-8553 is an incomplete fix for the previously reported CVE-2015-0777.