Unrated severityNVD Advisory· Published Oct 30, 2015· Updated May 6, 2026
CVE-2015-7972
CVE-2015-7972
Description
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
Affected products
15- osv-coords15 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 4.7.0_12-1.3+ 14 more
- (no CPE)range: < 4.7.0_12-1.3
- (no CPE)range: < 4.2.5_18-21.1
- (no CPE)range: < 4.4.3_06-29.1
- (no CPE)range: < 4.4.3_06-22.15.1
- (no CPE)range: < 4.1.6_08-23.1
- (no CPE)range: < 4.2.5_18-21.1
- (no CPE)range: < 4.2.5_18-21.1
- (no CPE)range: < 4.4.3_06-29.1
- (no CPE)range: < 4.4.3_06-22.15.1
- (no CPE)range: < 4.2.5_18-21.1
- (no CPE)range: < 4.4.3_06-29.1
- (no CPE)range: < 4.4.3_06-22.15.1
- (no CPE)range: < 4.2.5_18-21.1
- (no CPE)range: < 4.4.3_06-29.1
- (no CPE)range: < 4.4.3_06-22.15.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- xenbits.xen.org/xsa/advisory-153.htmlnvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-11/msg00063.htmlnvd
- support.citrix.com/article/CTX202404nvd
- www.debian.org/security/2015/dsa-3414nvd
- www.securityfocus.com/bid/77365nvd
- www.securitytracker.com/id/1034036nvd
- security.gentoo.org/glsa/201604-03nvd
News mentions
0No linked articles in our index yet.