Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8339

Опубликовано: 08 дек. 2015
Источник: redhat
CVSS3: 6.2
CVSS2: 6.3
EPSS Низкий

Описание

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

A malicious guest administrator may be able to deny service by crashing the host or causing a deadlock by timing memory handling events between the guest and the host.

Отчет

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels. At this time, there is no plans to fix this issue, if you feel that this issue is affecting your deployment and have an EUS subscription, please contact support to have this issue correctly prioritized

Меры по смягчению последствий

The vulnerability can be avoided if the guest kernel is controlled by the host rather than guest administrator, provided that further steps are taken to prevent the guest administrator from loading code into the kernel (e.g. by disabling loadable modules etc) or from using other mechanisms which allow them to run code at kernel privilege. In Xen HVM, controlling the guest's kernel would involve locking down the bootloader.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-667
https://bugzilla.redhat.com/show_bug.cgi?id=1284919xen: XENMEM_exchange error handling may cause DoS to host

EPSS

Процентиль: 27%
0.00097
Низкий

6.2 Medium

CVSS3

6.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

nvd
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

debian
около 10 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4 ...

github
больше 3 лет назад

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

suse-cvrf
около 10 лет назад

Security update for xen

EPSS

Процентиль: 27%
0.00097
Низкий

6.2 Medium

CVSS3

6.3 Medium

CVSS2