Description
The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-479-1 | xen security update |
Debian DSA |
DSA-3414-1 | xen security update |
EUVD |
EUVD-2015-7867 | The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:06:31.452Z
Reserved: 2015-10-23T00:00:00.000Z
Link: CVE-2015-7970
No data.
Status : Modified
Published: 2015-10-30T15:59:06.967
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-7970
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD