CVE-2015-7972 in XenServer
Summary
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Reservation
10/23/2015
Disclosure
10/30/2015
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 78963 | XenSource XenServer Populate-on-Demand resource management | 399 | Unproven | Official fix | CVE-2015-7972 |