xen is vulnerable to denial of service (DoS). The vulnerability exists as through the RCU (Read, Copy, Update) mechanism’s synchronisation primitive, where a buggy error path in the XENMEM_acquire_resource
exits without releasing an RCU reference.
lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/
lists.fedoraproject.org/archives/list/[email protected]/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/
lists.fedoraproject.org/archives/list/[email protected]/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/
security.gentoo.org/glsa/202011-06
xenbits.xen.org/xsa/advisory-334.html