Vulnerability Description
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | - |
| Redhat | Enterprise Linux | 5 |
Related Weaknesses (CWE)
References
- http://xenbits.xen.org/xsa/advisory-120.htmlPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Aug/18
- https://www.debian.org/security/2019/dsa-4497
- http://xenbits.xen.org/xsa/advisory-120.htmlPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Aug/18
- https://www.debian.org/security/2019/dsa-4497
FAQ
What is CVE-2015-8553?
CVE-2015-8553 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists b...
How severe is CVE-2015-8553?
CVE-2015-8553 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8553?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Redhat Enterprise Linux.