CVE-2015-7972
30.10.2015, 15:59
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."Enginsight
Vendor | Product | Version |
---|---|---|
xen | xen | 3.4.0 |
xen | xen | 3.4.1 |
xen | xen | 3.4.2 |
xen | xen | 3.4.3 |
xen | xen | 3.4.4 |
xen | xen | 4.0.0 |
xen | xen | 4.0.1 |
xen | xen | 4.0.2 |
xen | xen | 4.0.3 |
xen | xen | 4.0.4 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
xen | xen | 4.1.4 |
xen | xen | 4.1.5 |
xen | xen | 4.1.6.1 |
xen | xen | 4.2.0 |
xen | xen | 4.2.1 |
xen | xen | 4.2.2 |
xen | xen | 4.2.3 |
xen | xen | 4.3.0 |
xen | xen | 4.3.1 |
xen | xen | 4.3.2 |
xen | xen | 4.3.4 |
xen | xen | 4.4.0 |
xen | xen | 4.4.1 |
xen | xen | 4.5.0 |
xen | xen | 4.5.1 |
xen | xen | 4.6.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References