An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html | mailing list |
http://www.securityfocus.com/bid/101496 | vdb entry third party advisory |
https://xenbits.xen.org/xsa/advisory-239.html | mailing list patch mitigation vendor advisory |
https://www.debian.org/security/2017/dsa-4050 | vendor advisory |
https://support.citrix.com/article/CTX228867 | |
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html | mailing list |
https://security.gentoo.org/glsa/201801-14 | vendor advisory |
http://www.securitytracker.com/id/1039568 | vdb entry third party advisory |