First published: Fri Oct 30 2015(Updated: )
The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =3.4.0 | |
Xen xen-unstable | =3.4.1 | |
Xen xen-unstable | =3.4.2 | |
Xen xen-unstable | =3.4.3 | |
Xen xen-unstable | =3.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7970 is classified as a high severity vulnerability due to its ability to cause denial of service.
To fix CVE-2015-7970, upgrade to a patched version of Xen that addresses this issue.
CVE-2015-7970 can lead to excessive CPU consumption and may cause the system to reboot.
CVE-2015-7970 affects Xen versions 3.4.x, 3.5.x, and 3.6.x.
Local x86 HVM guest administrators are at risk from CVE-2015-7970, as they can exploit the vulnerability to disrupt services.