CVE Vulnerabilities

CVE-2017-15596

Uncontrolled Resource Consumption

Published: Oct 18, 2017 | Modified: Apr 20, 2025
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
4 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
XenXen4.4.0 (including)4.4.0 (including)
XenXen4.4.0-rc1 (including)4.4.0-rc1 (including)
XenXen4.4.0-rc2 (including)4.4.0-rc2 (including)
XenXen4.4.0-rc3 (including)4.4.0-rc3 (including)
XenXen4.4.0-rc4 (including)4.4.0-rc4 (including)
XenXen4.4.0-rc5 (including)4.4.0-rc5 (including)
XenXen4.4.0-rc6 (including)4.4.0-rc6 (including)
XenXen4.4.1 (including)4.4.1 (including)
XenXen4.4.1-rc1 (including)4.4.1-rc1 (including)
XenXen4.4.1-rc2 (including)4.4.1-rc2 (including)
XenXen4.4.2 (including)4.4.2 (including)
XenXen4.4.2-rc1 (including)4.4.2-rc1 (including)
XenXen4.4.2-rc2 (including)4.4.2-rc2 (including)
XenXen4.4.3 (including)4.4.3 (including)
XenXen4.4.3-rc1 (including)4.4.3-rc1 (including)
XenXen4.4.4 (including)4.4.4 (including)
XenXen4.5.0 (including)4.5.0 (including)
XenXen4.5.0-rc1 (including)4.5.0-rc1 (including)
XenXen4.5.0-rc2 (including)4.5.0-rc2 (including)
XenXen4.5.0-rc3 (including)4.5.0-rc3 (including)
XenXen4.5.0-rc4 (including)4.5.0-rc4 (including)
XenXen4.5.1 (including)4.5.1 (including)
XenXen4.5.1-rc1 (including)4.5.1-rc1 (including)
XenXen4.5.1-rc2 (including)4.5.1-rc2 (including)
XenXen4.5.2 (including)4.5.2 (including)
XenXen4.5.3 (including)4.5.3 (including)
XenXen4.5.4 (including)4.5.4 (including)
XenXen4.5.5 (including)4.5.5 (including)
XenXen4.6.0 (including)4.6.0 (including)
XenXen4.6.0-rc1 (including)4.6.0-rc1 (including)
XenXen4.6.0-rc2 (including)4.6.0-rc2 (including)
XenXen4.6.0-rc3 (including)4.6.0-rc3 (including)
XenXen4.6.0-rc4 (including)4.6.0-rc4 (including)
XenXen4.6.0-rc5 (including)4.6.0-rc5 (including)
XenXen4.6.1 (including)4.6.1 (including)
XenXen4.6.2 (including)4.6.2 (including)
XenXen4.6.3 (including)4.6.3 (including)
XenXen4.6.4 (including)4.6.4 (including)
XenXen4.6.5 (including)4.6.5 (including)
XenXen4.6.6 (including)4.6.6 (including)
XenXen4.7.0 (including)4.7.0 (including)
XenXen4.7.0-rc1 (including)4.7.0-rc1 (including)
XenXen4.7.0-rc2 (including)4.7.0-rc2 (including)
XenXen4.7.0-rc3 (including)4.7.0-rc3 (including)
XenXen4.7.0-rc4 (including)4.7.0-rc4 (including)
XenXen4.7.0-rc5 (including)4.7.0-rc5 (including)
XenXen4.7.0-rc6 (including)4.7.0-rc6 (including)
XenXen4.7.1 (including)4.7.1 (including)
XenXen4.7.2 (including)4.7.2 (including)
XenXen4.7.3 (including)4.7.3 (including)
XenXen4.8.0 (including)4.8.0 (including)
XenXen4.8.0-rc1 (including)4.8.0-rc1 (including)
XenXen4.8.0-rc2 (including)4.8.0-rc2 (including)
XenXen4.8.0-rc3 (including)4.8.0-rc3 (including)
XenXen4.8.0-rc4 (including)4.8.0-rc4 (including)
XenXen4.8.0-rc5 (including)4.8.0-rc5 (including)
XenXen4.8.0-rc6 (including)4.8.0-rc6 (including)
XenXen4.8.0-rc7 (including)4.8.0-rc7 (including)
XenXen4.8.0-rc8 (including)4.8.0-rc8 (including)
XenXen4.8.1 (including)4.8.1 (including)
XenXen4.8.2 (including)4.8.2 (including)
XenXen4.9.0 (including)4.9.0 (including)
XenXen4.9.0-rc1 (including)4.9.0-rc1 (including)
XenXen4.9.0-rc1.1 (including)4.9.0-rc1.1 (including)
XenXen4.9.0-rc1.2 (including)4.9.0-rc1.2 (including)
XenXen4.9.0-rc2 (including)4.9.0-rc2 (including)
XenXen4.9.0-rc3 (including)4.9.0-rc3 (including)
XenXen4.9.0-rc4 (including)4.9.0-rc4 (including)
XenXen4.9.0-rc5 (including)4.9.0-rc5 (including)
XenXen4.9.0-rc6 (including)4.9.0-rc6 (including)
XenXen4.9.0-rc7 (including)4.9.0-rc7 (including)
XenXen4.9.0-rc8 (including)4.9.0-rc8 (including)
XenXen4.9.0-rc9 (including)4.9.0-rc9 (including)
XenUbuntuartful*
XenUbuntubionic*
XenUbuntuesm-infra/bionic*
XenUbuntuesm-infra/xenial*
XenUbuntutrusty*
XenUbuntuupstream*
XenUbuntuxenial*
XenUbuntuzesty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References