SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen vCPU Pointer Memory Leak Lets Local Users on a Privileged Guest System Cause Denial of Service Conditions on the Host System
SecurityTracker Alert ID:  1034033
SecurityTracker URL:  http://securitytracker.com/id/1034033
CVE Reference:   CVE-2015-7969   (Links to External Site)
Date:  Oct 30 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.0 and after; 4.3.x, 4.4.x, 4.5.x, 4.6.x
Description:   Two vulnerabilities were reported in Xen. A local user on a privileged guest system can cause denial of service conditions on the host system.

A local user on a guest system granted control via XEN_DOMCTL_max_vcpus can trigger a vCPU pointer memory leak on domain teardown and eventually consume excessive memory on the host system.

The maximum leak is 64kbytes per domain per reboot.

Systems using libxl, libvirt, or OpenStack are not affected.

Ian Campbell of Citrix reported this vulnerability.

A local guest system administrator via XENOPROF_get_buffer or a local user on a guest system granted control of another domain via XENOPROF_set_passive can trigger a memory leak on domain teardown and eventually consume excessive memory on the host system.

The maximum leak is 128kbytes per domain per reboot.

ARM is not affected by this second vulnerability.

Jan Beulich of SUSE reported this vulnerability.

Impact:   A local user on a privileged guest system can consume excessive memory on the host system.
Solution:   The vendor has issued a fix (xsa149.patch, xsa151.patch).

The vendor's advisories are available at:

http://xenbits.xen.org/xsa/advisory-149.html
http://xenbits.xen.org/xsa/advisory-151.html

Vendor URL:  xenbits.xen.org/xsa/advisory-149.html (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC