CVE-2015-7972XEN vulnerability

CWE-3997 documents6 sources
Severity
2.1LOWNVD
EPSS
0.1%
top 78.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 14

Description

The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."

CVSS vector

AV:L/AC:L/C:N/I:N/A:PExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.6.0-1 (bookworm)
Debianxen/xen< 4.6.0-1+3
NVDxen/xen30 versions+29

🔴Vulnerability Details

2
GHSA
GHSA-4pv8-hfx7-rfh8: The (1) libxl_set_memory_target function in tools/libxl/libxl2022-05-14
OSV
CVE-2015-7972: The (1) libxl_set_memory_target function in tools/libxl/libxl2015-10-30

📋Vendor Advisories

2
Red Hat
xen: populate-on-demand balloon size inaccuracy can crash guests on x862015-10-29
Debian
CVE-2015-7972: xen - The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__b...2015

💬Community

2
Bugzilla
CVE-2015-7969 CVE-2015-7970 CVE-2015-7813 CVE-2015-7814 CVE-2015-7812 CVE-2015-7971 CVE-2015-7835 CVE-2015-7972 xen: various flaws [fedora-all]2015-10-29
Bugzilla
CVE-2015-7972 xen: populate-on-demand balloon size inaccuracy can crash guests on x862015-10-28