First published: Fri Jan 08 2016(Updated: )
The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8615 is classified as a denial of service vulnerability.
To fix CVE-2015-8615, you should update to a patched version of Xen that addresses this vulnerability.
CVE-2015-8615 affects local HVM guest OS users running Xen 4.6.0.
CVE-2015-8615 is caused by the hvm_set_callback_via function not limiting the number of printk messages, leading to potential denial of service.
While the best course of action is to update, temporarily restricting access to the callback method can serve as a workaround for CVE-2015-8615.