FreeBSD : xen-kernel -- Information leak through XEN_DOMCTL_gettscinfo (ce658051-27ea-11e5-a4a5-002590263bf5)

low Nessus Plugin ID 84714


The remote FreeBSD host is missing a security-related update.


The Xen Project reports :

The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding field subsequently copied to guest memory.

A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being addressed here regardless of that operation being declared unsafe for disaggregation by XSA-77.

Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 may be able to read sensitive data relating to the hypervisor or other guests not under the control of that domain.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 84714

File Name: freebsd_pkg_ce65805127ea11e5a4a5002590263bf5.nasl

Version: 2.4

Type: local

Published: 7/14/2015

Updated: 1/6/2021

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Low

Base Score: 2.9

Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xen-kernel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/11/2015

Vulnerability Publication Date: 4/20/2015

Reference Information

CVE: CVE-2015-3340