CVE-2015-7971
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2015-7971 from the MITRE CVE dictionary dictionary and NIST NVD.
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise Linux 5 | xen | Will not fix |
Mitigation
The problematic log messages are issued with priority Warning. Therefore they can be rate limited by adding "loglvl=error/warning" to the hypervisor command line or suppressed entirely by adding "loglvl=error". On systems where the guest kernel is controlled by the host rather than guest administrator, running only kernels which do not call these hypercalls will also prevent untrusted guest users from exploiting this issue. However untrusted guest administrators can still trigger it unless further steps are taken to prevent them from loading code into the kernel (e.g. by disabling loadable modules etc) or from using other mechanisms which allow them to run code at kernel privilege.
External References
CVE description copyright © 2017, The MITRE Corporation
