CVE-2015-8553 — Sensitive Information Exposure in Linux
Severity
6.5MEDIUMNVD
OSV2.1
EPSS
0.3%
top 49.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 13
Latest updateMay 14
Description
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0
Affected Packages2 packages
Also affects: Enterprise Linux 5
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-p4j9-qwcx-6mjj: Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decodin↗2022-05-14
OSV▶
CVE-2015-8553: Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decodin↗2016-04-13
📋Vendor Advisories
2💬Community
4Bugzilla▶
CVE-2015-8554 CVE-2015-8555 CVE-2015-8550 CVE-2015-8551 CVE-2015-8552 CVE-2015-2150 CVE-2015-8553 xen: various flaws [fedora-all]↗2015-12-17
Bugzilla▶
CVE-2015-8551 CVE-2015-8552 xsa157 xen: Linux pciback missing sanity checks leading to crash (XSA-157)↗2015-12-07
Bugzilla▶
CVE-2015-2150 CVE-2015-8553 kernel: xen: non-maskable interrupts triggerable by guests (xsa120) [fedora-all]↗2015-03-10
Bugzilla
▶