Information Exposure Affecting xen package, versions [4.3.0,4.6.1]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.33% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-XEN-2383939
  • published26 Jan 2022
  • disclosed13 Apr 2016
  • creditUnknown

Introduced: 13 Apr 2016

CVE-2015-8555  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for xen.

Overview

Affected versions of this package are vulnerable to Information Exposure. Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.

References

CVSS Scores

version 3.1