Information exposure in Linux kernel - CVE-2015-0777
Published: April 6, 2015 / Updated: December 8, 2016
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to gain access to sensitive information.
drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
How to mitigate CVE-2015-0777
Sources
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://www.securityfocus.com/bid/73921
- https://bugzilla.novell.com/show_bug.cgi?id=917830