First published: Wed Apr 01 2015(Updated: )
Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | =4.3.0 | |
Xen XAPI | =4.3.1 | |
Xen XAPI | =4.3.2 | |
Xen XAPI | =4.4.0 | |
Xen XAPI | =4.4.0-rc1 | |
Xen XAPI | =4.4.1 | |
Xen XAPI | =4.5.0 | |
Fedora | =20 | |
Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2751 is classified as a medium severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2015-2751, users should upgrade to a version of Xen that is not affected by this vulnerability, such as Xen 4.6.x or later.
CVE-2015-2751 can lead to a denial of service by allowing remote domains to lock the host through specific operations.
CVE-2015-2751 affects Xen versions from 4.3.x to 4.5.x, including specific versions like 4.3.0, 4.4.0, and others.
CVE-2015-2751 primarily affects the Xen hypervisor and has implications for operating systems that use this virtualization technology, such as Fedora.