Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen HVM_PARAM_CALLBACK_IRQ Logging Error Lets Local Users on the Guest System Deny Service on the Hypervisor Console
SecurityTracker Alert ID:  1034512
SecurityTracker URL:
CVE Reference:   CVE-2015-8615   (Links to External Site)
Updated:  Dec 22 2015
Original Entry Date:  Dec 21 2015
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.6.x
Description:   A vulnerability was reported in Xen. A local user on the guest system can cause denial of service conditions on the target system.

The HVM_PARAM_CALLBACK_IRQ operation logs callback methods to the hypervisor console when not in debug mode and is not rate limited. A local user on a guest system can cause excessive log messages to be written to the hypervisor console.

x86 HVM guests can trigger this vulnerability.

ARM systems are not affected.

Malcolm Crossley of Citrix and Jan Beulich of SuSE reported this vulnerability.

Impact:   A local user on the guest system can log an excessive number of error messages to the target hypervisor console.
Solution:   The vendor has issued a fix (xsa169.patch).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC