{
  "threat_severity" : "Low",
  "public_date" : "2015-03-06T00:00:00Z",
  "bugzilla" : {
    "description" : "xen: information leak via version information hypercall (XSA-122)",
    "id" : "1195298",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1195298"
  },
  "cvss" : {
    "cvss_base_score" : "2.9",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:N/C:P/I:N/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-212",
  "details" : [ "The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors." ],
  "statement" : "This issue does affect the Xen hypervisor as shipped with Red Hat Enterprise Linux 5.\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
  "acknowledgement" : "Red Hat would like to thank Xen project for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-2045\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-2045\nhttp://xenbits.xen.org/xsa/advisory-122.html" ],
  "name" : "CVE-2015-2045",
  "csaw" : false
}