The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm | |
https://security.gentoo.org/glsa/201504-04 | vendor advisory |
http://support.citrix.com/article/CTX200484 | |
http://www.securityfocus.com/bid/72955 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html | third party advisory vendor advisory |
http://www.debian.org/security/2015/dsa-3181 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html | third party advisory vendor advisory |
http://www.securitytracker.com/id/1031837 | vdb entry third party advisory |
http://xenbits.xen.org/xsa/advisory-122.html | patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html | vendor advisory |
http://www.securitytracker.com/id/1031806 | vdb entry third party advisory |