Xen x86 FPU/XMM Stack/Register Initialization Flaw Lets Local Users on a Guest System Obtain Potentially Sensitive Information from Other Domains on the Target System
|
SecurityTracker Alert ID: 1034477 |
SecurityTracker URL: http://securitytracker.com/id/1034477
|
CVE Reference:
CVE-2015-8555
(Links to External Site)
|
Date: Dec 17 2015
|
Impact:
Disclosure of authentication information, Disclosure of system information, Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 4.3.x, 4.4.x, 4.5.x, 4.6.x
|
Description:
A vulnerability was reported in Xen. A local user on a guest system can obtain potentially sensitive information from other domains on the target system.
When XSAVE/XRSTOR are not in use by Xen to manage guest extended register state, a local user on a guest system can obtain potentially sensitive information from the FPU stack and XMM registers that were written by another domain on the target system.
x86 systems without XSAVE support or with XSAVE support disabled are affected.
ARM systems are not affected.
This issue was discovered by Jan Beulich of SUSE.
|
Impact:
A local user on a guest system can obtain potentially sensitive information from other domains on the target system.
|
Solution:
The vendor has issued a fix (xsa165-4.3.patch, xsa165-4.5.patch, xsa165-4.6.patch, and xsa165.patch).
The vendor's advisory is available at:
http://xenbits.xen.org/xsa/advisory-165.html
|
Vendor URL: xenbits.xen.org/xsa/advisory-165.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|