An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.6.0 (including) | 4.14.0 (including) |
Xen | Ubuntu | bionic | * |
Xen | Ubuntu | esm-apps/focal | * |
Xen | Ubuntu | esm-infra/bionic | * |
Xen | Ubuntu | esm-infra/xenial | * |
Xen | Ubuntu | focal | * |
Xen | Ubuntu | groovy | * |
Xen | Ubuntu | hirsute | * |
Xen | Ubuntu | impish | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | xenial | * |