CVE-2015-8338Improper Locking in XEN

Severity
7.2HIGHNVD
EPSS
0.2%
top 58.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 17
Latest updateMay 17

Description

Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.0~rc3-1 (bookworm)
Debianxen/xen< 4.8.0~rc3-1+3
NVDxen/xen4.6.0

🔴Vulnerability Details

2
GHSA
GHSA-2h27-hv8q-h9cg: Xen 42022-05-17
OSV
CVE-2015-8338: Xen 42015-12-17

📋Vendor Advisories

2
Red Hat
xen: Long running memory operations on ARM cause DoS2015-12-08
Debian
CVE-2015-8338: xen - Xen 4.6.x and earlier does not properly enforce limits on page order inputs for ...2015

💬Community

2
Bugzilla
CVE-2015-8338 CVE-2015-8339 CVE-2015-8340 CVE-2015-8341 xen: various flaws [fedora-all]2015-12-08
Bugzilla
CVE-2015-8338 xen: Long running memory operations on ARM cause DoS2015-11-24