Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html | |
https://xenbits.xen.org/xsa/advisory-207.html | Mitigation Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html | |
https://xenbits.xen.org/xsa/advisory-207.html | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html - | |
References | () https://xenbits.xen.org/xsa/advisory-207.html - Mitigation, Patch, Vendor Advisory |
Information
Published : 2017-09-13 22:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14431
Mitre link : CVE-2017-14431
CVE.ORG link : CVE-2017-14431
JSON object : View
Products Affected
xen
- xen
CWE
CWE-772
Missing Release of Resource after Effective Lifetime