CVE-2015-0777

drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-04-05 21:59

Updated : 2024-02-04 18:35


NVD link : CVE-2015-0777

Mitre link : CVE-2015-0777

CVE.ORG link : CVE-2015-0777


JSON object : View

Products Affected

xen

  • xen

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor