xen is vulnerable to denial of service. Race conditions in evtchn_reset()
and uses of EVTCHNOP_reset
or XEN_DOMCTL_soft_reset
can lead to the violation of various internal assumptions, resulting in out of bounds memory accesses.
lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html
www.openwall.com/lists/oss-security/2020/12/16/5
lists.fedoraproject.org/archives/list/[email protected]/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/
lists.fedoraproject.org/archives/list/[email protected]/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/
lists.fedoraproject.org/archives/list/[email protected]/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/
security.gentoo.org/glsa/202011-06
www.debian.org/security/2020/dsa-4769
xenbits.xen.org/xsa/advisory-343.html