First published: Mon Jun 15 2015(Updated: )
GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.3.4 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 | |
Xen xen-unstable | =4.4.1 | |
Xen xen-unstable | =4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4163 has a medium severity level as it allows local guest domains to cause a denial of service through a NULL pointer dereference.
To fix CVE-2015-4163, upgrade your Xen software to a version that is not affected, starting from version 4.5.0 and later.
CVE-2015-4163 affects Xen versions 4.2.0 through 4.5.0, including versions 4.2.x, 4.3.x, and 4.4.x.
CVE-2015-4163 allows for a denial of service attack, leading to potential crashes of guest domains.
CVE-2015-4163 cannot be exploited remotely as it requires local access within the guest domain.