4.7
CVSSv2

CVE-2015-8340

Published: 17/12/2015 Updated: 01/07/2017
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 418
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The memory_exchange function in common/memory.c in Xen 3.2.x up to and including 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.4.2

xen xen 3.4.3

xen xen 3.2.1

xen xen 3.2.0

xen xen 4.1.6

xen xen 4.1.6.1

xen xen 4.2.2

xen xen 4.3.1

xen xen 4.3.2

xen xen 4.5.0

xen xen 4.5.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 3.3.1

xen xen 3.3.2

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.2.4

xen xen 4.4.0

xen xen 4.4.1

xen xen 3.4.0

xen xen 3.4.1

xen xen 3.2.2

xen xen 3.2.3

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.2.5

xen xen 4.3.0

xen xen 4.4.2

xen xen 4.4.3

xen xen 4.0.0

xen xen 4.0.1

xen xen 4.0.2

xen xen 3.4.4

xen xen 3.3.0

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.0

xen xen 4.3.3

xen xen 4.3.4

xen xen 4.5.2

xen xen 4.6.0

Vendor Advisories

Debian Bug report logs - #823620 Multiple security issues Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 6 May 2016 18:03:02 UTC Severity: grave Tags: security Fixed in versions xen/480~rc3-1, xen/48 ...
Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure The oldstable distribution (wheezy) will be updated in a separate DSA For the stable distribution (jessie), these problems have been fixed in version 441-9+deb8u4 For the unstable distribution (sid), thes ...