CVE-2015-8553

NameCVE-2015-8553
DescriptionXen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4497-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie, jessie (lts)3.16.84-1vulnerable
stretch (security)4.9.320-2fixed
stretch (lts), stretch4.9.320-3fixed
buster (security), buster, buster (lts)4.19.316-1fixed
bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.115-1fixed
bookworm (security)6.1.119-1fixed
trixie6.12.5-1fixed
sid6.12.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcestretch4.9.168-1+deb9u5DSA-4497-1
linuxsource(unstable)4.19.37-1
linux-2.6source(unstable)(unfixed)

Notes

[jessie] - linux <ignored> (Intrusive; breaks qemu as used in Jessie; cf. kernel-sec for more details)
[wheezy] - linux <ignored> (Intrusive; breaks qemu as used in Wheezy; cf. kernel-sec for more details)
[squeeze] - linux-2.6 <no-dsa> (Xen not supported in Squeeze LTS)
CVE for the incomplete patches from XSA-120 and supplied in
XSA-120 v5+ addendum patch.
Cf. https://bugzilla.redhat.com/show_bug.cgi?id=1289128#c2
http://xenbits.xen.org/xsa/advisory-120.html
Patch is discussed in http://thread.gmane.org/gmane.comp.emulators.xen.devel/140440/focus=140441
and http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1924088
https://git.kernel.org/linus/7681f31ec9cdacab4fd10570be924f2cef6669ba

Search for package or bug name: Reporting problems