First published: Wed Jan 07 2015(Updated: )
Use-after-free vulnerability in Xen 4.2.x, 4.3.x, and 4.4.x allows remote domains to cause a denial of service (system crash) via a crafted hypercall during HVM guest teardown.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.2.4 | |
Xen xen-unstable | =4.2.5 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.3.2 | |
Xen xen-unstable | =4.3.3 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0361 has a high severity rating as it allows remote domains to cause a denial of service through crafted hypercalls.
To fix CVE-2015-0361, update your Xen installation to a version that addresses this vulnerability.
CVE-2015-0361 affects Xen versions 4.2.x, 4.3.x, and 4.4.x.
Yes, CVE-2015-0361 can lead to a system crash due to the use-after-free vulnerability during HVM guest teardown.
CVE-2015-0361 is a remote vulnerability that can be exploited by an attacker from a remote domain.