CVE-2018-5244

Name
CVE-2018-5244
Description
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://xenbits.xen.org/xsa/advisory-253.html
Third Party Advisory http://www.securityfocus.com/bid/102433
SECTRACK http://www.securitytracker.com/id/1040774
GENTOO https://security.gentoo.org/glsa/201810-06

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* xen >= 4.10.0 <= None

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen edge-main 4.15.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.12-main 4.13.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.11-main 4.13.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.14-main 4.15.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.13-main 4.14.3-r0 Natanael Copa <ncopa@alpinelinux.org> fixed