http://lists.xen.org/archives/html/xen-users/2015-04/msg00091.html
VULNERABLE SYSTEMS
==================
・Xen 4.0.x 以降
・x86のみ
ISSUE DESCRIPTION
=================
The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding
field subsequently copied to guest memory.
A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being
addressed here regardless of that operation being declared unsafe for
disaggregation by XSA-77.
IMPACT
======
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 may be able to read sensitive data relating to the
hypervisor or other guests not under the control of that domain.
初期化漏れですね。
<2015年4月23日追記>
Xen Security Advisory CVE-2015-3340 / XSA-132 version 2
Information leak through XEN_DOMCTL_gettscinfo
http://lists.xen.org/archives/html/xen-users/2015-04/msg00112.html
<2015年4月23日追記>
Xen Security Advisory CVE-2015-3340 / XSA-132 version 2
Information leak through XEN_DOMCTL_gettscinfo
http://lists.xen.org/archives/html/xen-users/2015-04/msg00112.html
Version2というかアップデートパッチがでました。
0 件のコメント:
コメントを投稿