Vulnerability Description
The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.4.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.h
- http://www.debian.org/security/2015/dsa-3414
- http://www.securitytracker.com/id/1034031
- http://xenbits.xen.org/xsa/advisory-145.htmlPatchVendor Advisory
- https://security.gentoo.org/glsa/201604-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.h
- http://www.debian.org/security/2015/dsa-3414
- http://www.securitytracker.com/id/1034031
- http://xenbits.xen.org/xsa/advisory-145.htmlPatchVendor Advisory
- https://security.gentoo.org/glsa/201604-03
FAQ
What is CVE-2015-7812?
CVE-2015-7812 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multica...
How severe is CVE-2015-7812?
CVE-2015-7812 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7812?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.