An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest
XS_RESET_WATCHES request, not all tracking information is freed. A guest
can cause unbounded memory usage in oxenstored. This can lead to a
system-wide DoS. Only systems using the Ocaml Xenstored implementation are
vulnerable. Systems using the C Xenstored implementation are not
vulnerable.
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |