2.1
CVSSv2

CVE-2015-6654

Published: 03/09/2015 Updated: 07/12/2016
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and previous versions does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.4.0

xen xen 4.5.1

xen xen 4.5.0

Vendor Advisories

Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure For the oldstable distribution (wheezy), an update will be provided later For the stable distribution (jessie), these problems have been fixed in version 441-9+deb8u3 For the unstable distribution (sid), ...
Debian Bug report logs - #800128 xen: CVE-2015-6654: printk is not rate-limited in xenmem_add_to_physmap_one Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 27 Sep 2015 07:33:05 UTC Severity: normal T ...
Debian Bug report logs - #823620 Multiple security issues Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 6 May 2016 18:03:02 UTC Severity: grave Tags: security Fixed in versions xen/480~rc3-1, xen/48 ...

Recent Articles

New Xen bug uses security feature to destroy security
The Register • Simon Sharwood • 01 Sep 2015

Dis-ARM-ing flaw can cook your console

Xen has revealed details of bug CVE-2015-6654, which it warned about a couple of weeks back. The good news is that this one is rather less nasty than the string of guest/host escapes it's reported lately thanks largely to leaks in QEMU. Another nice piece of news is that this time around the problem's also only on ARM-compatible silicon, so even fewer folk will need to reach for their patch-o-matics. The bad news is that it's still a flaw and one that can create a denial of service attack on a X...