Описание
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
Ссылки
- Third Party AdvisoryVDB Entry
- Issue TrackingMitigationVendor Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingMitigationVendor Advisory
Уязвимые конфигурации
EPSS
6.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
In Xen 4.10, new infrastructure was introduced as part of an overhaul ...
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
EPSS
6.5 Medium
CVSS3
4.9 Medium
CVSS2