Vulnerability Description
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.0.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.h
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
- http://support.citrix.com/article/CTX202404
- http://www.debian.org/security/2015/dsa-3414
- http://www.securityfocus.com/bid/77364
- http://www.securitytracker.com/id/1034033
- http://xenbits.xen.org/xsa/advisory-149.htmlVendor Advisory
- http://xenbits.xen.org/xsa/advisory-151.htmlVendor Advisory
- https://security.gentoo.org/glsa/201604-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.h
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
FAQ
What is CVE-2015-7969?
CVE-2015-7969 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" o...
How severe is CVE-2015-7969?
CVE-2015-7969 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7969?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.