An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
http://www.debian.org/security/2017/dsa-3969 | vendor advisory |
https://xenbits.xen.org/xsa/advisory-235.html | patch vendor advisory mitigation |
http://www.securitytracker.com/id/1039568 | vdb entry third party advisory |