SDLab

SDLab
SDLab.org::Adminな脳み

2015年4月21日火曜日

[Xen-users] Xen Security Advisory 132 - Information leak through XEN_DOMCTL_gettscinfo

[Xen-users] Xen Security Advisory 132 - Information leak through XEN_DOMCTL_gettscinfo
http://lists.xen.org/archives/html/xen-users/2015-04/msg00091.html

VULNERABLE SYSTEMS
==================
・Xen 4.0.x 以降
・x86のみ

ISSUE DESCRIPTION
=================
The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding
field subsequently copied to guest memory.
A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being
addressed here regardless of that operation being declared unsafe for
disaggregation by XSA-77.

IMPACT
======
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 may be able to read sensitive data relating to the
hypervisor or other guests not under the control of that domain.

初期化漏れですね。


<2015年4月23日追記>
Xen Security Advisory CVE-2015-3340 / XSA-132  version 2
 Information leak through XEN_DOMCTL_gettscinfo
http://lists.xen.org/archives/html/xen-users/2015-04/msg00112.html

Version2というかアップデートパッチがでました。


0 件のコメント:

コメントを投稿