CVE-2015-7969

Loading...

General

Score:4.9/10.0
Severity:Low
Category:Resource Management Error

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Complete

Exploitability Metrics

Access Vector:Local
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2014-0222, CVE-2015-2752, CVE-2015-2756, CVE-2015-3259, CVE-2015-3340, CVE-2015-4037, CVE-2015-5165, CVE-2015-5239, CVE-2015-5307, CVE-2015-6654, CVE-2015-6815, CVE-2015-7311, CVE-2015-7504, CVE-2015-7812, CVE-2015-7813, CVE-2015-7814, CVE-2015-7835, CVE-2015-7970, CVE-2015-7971, CVE-2015-7972, CVE-2015-8104, CVE-2015-8339, CVE-2015-8340, CVE-2015-8341, CVE-2015-8345, CVE-2015-8550, CVE-2015-8554, CVE-2015-8555, CVE-2015-8615, CVE-2016-1570, CVE-2016-1571, CVE-2016-2270, CVE-2016-2271

Published on 30/10/15 - Updated on 01/07/17

Description

Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.

Category: Resource Management Error

CWE-399 (Resource Management Errors)
Weaknesses in this category are related to improper management of system resources.

Security Notices

US National Vulnerability DatabaseCVE-2015-7969
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2015-AVI-458
Debian DSA-3414-1
Debian LTSDLA-479-1
SUSE SUSE-SU-2015:1853, SUSE-SU-2015:1894, SUSE-SU-2015:1908, SUSE-SU-2015:1952, SUSE-SU-2015:2306, SUSE-SU-2015:2326, SUSE-SU-2015:2328, SUSE-SU-2015:2338

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
xenxen

Share this vulnerability with:

Twitter Facebook LinkedIn Mail