CVE-2015-7972 in XenServerinfo

Summary

The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

10/23/2015

Disclosure

10/30/2015

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you need the next level of professionalism?

Upgrade your account now!