{"id":"CVE-2015-8553","details":"Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.","modified":"2026-04-10T03:45:31.684689Z","published":"2016-04-13T15:59:07Z","references":[{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-120.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4497"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-120.html"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Aug/18"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}