SB2015090301 - Multiple vulnerabilities in Xen



SB2015090301 - Multiple vulnerabilities in Xen

Published: September 3, 2015 Updated: August 9, 2020

Security Bulletin ID SB2015090301
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2015-7311)

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2015-6654)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.


Remediation

Install update from vendor's website.