Data Handling in Xen - CVE-2015-7971

 

Data Handling in Xen - CVE-2015-7971

Published: October 30, 2015 / Updated: August 9, 2020


Vulnerability identifier: #VU40618
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-7971
CWE-ID: CWE-19
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Xen Project
Affected software:
Xen

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.


How to mitigate CVE-2015-7971

Install update from vendor's website.

Sources