Vulnerability Details : CVE-2015-7812
The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface.
Vulnerability category: Denial of service
Products affected by CVE-2015-7812
- cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7812
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7812
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2015-7812
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7812
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
[SECURITY] Fedora 21 Update: xen-4.4.3-7.fc21
-
http://www.securitytracker.com/id/1034031
Xen ARM Multicall Processing Bug Lets Local Users on a Guest System Cause Denial of Service Conditions on the Host System - SecurityTracker
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
[SECURITY] Fedora 23 Update: xen-4.5.1-14.fc23
-
http://www.debian.org/security/2015/dsa-3414
Debian -- Security Information -- DSA-3414-1 xen
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
[SECURITY] Fedora 22 Update: xen-4.5.1-14.fc22
-
https://security.gentoo.org/glsa/201604-03
Xen: Multiple vulnerabilities (GLSA 201604-03) — Gentoo security
-
http://xenbits.xen.org/xsa/advisory-145.html
XSA-145 - Xen Security AdvisoriesPatch;Vendor Advisory
Jump to