The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-479-1 xen security update
Debian DSA Debian DSA DSA-3414-1 xen security update
EUVD EUVD EUVD-2015-7867 The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:06:31.452Z

Reserved: 2015-10-23T00:00:00

Link: CVE-2015-7970

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-10-30T15:59:06.967

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-7970

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-10-29T00:00:00Z

Links: CVE-2015-7970 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses