Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 3.3.0 (including) | 3.3.0 (including) |
Xen | Xen | 3.3.1 (including) | 3.3.1 (including) |
Xen | Xen | 3.3.2 (including) | 3.3.2 (including) |
Xen | Xen | 3.4.0 (including) | 3.4.0 (including) |
Xen | Xen | 3.4.1 (including) | 3.4.1 (including) |
Xen | Xen | 3.4.2 (including) | 3.4.2 (including) |
Xen | Xen | 3.4.3 (including) | 3.4.3 (including) |
Xen | Xen | 3.4.4 (including) | 3.4.4 (including) |
Xen | Xen | 4.0.0 (including) | 4.0.0 (including) |
Xen | Xen | 4.0.1 (including) | 4.0.1 (including) |
Xen | Xen | 4.0.2 (including) | 4.0.2 (including) |
Xen | Xen | 4.0.3 (including) | 4.0.3 (including) |
Xen | Xen | 4.0.4 (including) | 4.0.4 (including) |
Xen | Xen | 4.1.0 (including) | 4.1.0 (including) |
Xen | Xen | 4.1.1 (including) | 4.1.1 (including) |
Xen | Xen | 4.1.2 (including) | 4.1.2 (including) |
Xen | Xen | 4.1.3 (including) | 4.1.3 (including) |
Xen | Xen | 4.1.4 (including) | 4.1.4 (including) |
Xen | Xen | 4.1.5 (including) | 4.1.5 (including) |
Xen | Xen | 4.1.6 (including) | 4.1.6 (including) |
Xen | Xen | 4.1.6.1 (including) | 4.1.6.1 (including) |
Xen | Xen | 4.2.0 (including) | 4.2.0 (including) |
Xen | Xen | 4.2.1 (including) | 4.2.1 (including) |
Xen | Xen | 4.2.2 (including) | 4.2.2 (including) |
Xen | Xen | 4.2.3 (including) | 4.2.3 (including) |
Xen | Xen | 4.2.4 (including) | 4.2.4 (including) |
Xen | Xen | 4.2.5 (including) | 4.2.5 (including) |
Xen | Xen | 4.3.0 (including) | 4.3.0 (including) |
Xen | Xen | 4.3.1 (including) | 4.3.1 (including) |
Xen | Xen | 4.3.2 (including) | 4.3.2 (including) |
Xen | Xen | 4.3.3 (including) | 4.3.3 (including) |
Xen | Xen | 4.3.4 (including) | 4.3.4 (including) |
Xen | Xen | 4.4.0 (including) | 4.4.0 (including) |
Xen | Xen | 4.4.0-rc1 (including) | 4.4.0-rc1 (including) |
Xen | Xen | 4.4.1 (including) | 4.4.1 (including) |
Xen | Xen | 4.4.2 (including) | 4.4.2 (including) |
Xen | Xen | 4.4.3 (including) | 4.4.3 (including) |
Xen | Xen | 4.4.4 (including) | 4.4.4 (including) |
Xen | Xen | 4.5.0 (including) | 4.5.0 (including) |
Xen | Xen | 4.5.1 (including) | 4.5.1 (including) |
Xen | Xen | 4.5.2 (including) | 4.5.2 (including) |
Xen | Xen | 4.5.3 (including) | 4.5.3 (including) |
Xen | Xen | 4.5.5 (including) | 4.5.5 (including) |
Xen | Xen | 4.6.0 (including) | 4.6.0 (including) |
Xen | Xen | 4.6.1 (including) | 4.6.1 (including) |
Xen | Xen | 4.6.2 (including) | 4.6.2 (including) |
Xen | Xen | 4.6.4 (including) | 4.6.4 (including) |
Xen | Xen | 4.6.5 (including) | 4.6.5 (including) |
Xen | Xen | 4.7.1 (including) | 4.7.1 (including) |
Xen | Xen | 4.8.0 (including) | 4.8.0 (including) |
Xen | Xen | 4.8.1 (including) | 4.8.1 (including) |
Xen | Ubuntu | devel | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | xenial | * |
Xen | Ubuntu | zesty | * |