CVE-2017-15589
Publication date 18 October 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
Status
Package | Ubuntu Release | Status |
---|---|---|
xen | ||
18.04 LTS bionic |
Fixed 4.9.2-0ubuntu1
|
|
16.04 LTS xenial |
Fixed 4.6.4-0ubuntu1.4
|
|
14.04 LTS trusty | Not in release |
Notes
mdeslaur
hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |