Xen is vulnerable to denial of service. Upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn’t have access to anymore.
www.openwall.com/lists/oss-security/2021/09/01/1
www.openwall.com/lists/oss-security/2021/09/01/5
www.openwall.com/lists/oss-security/2021/09/01/6
lists.fedoraproject.org/archives/list/[email protected]/message/2VQCFAPBNGBBAOMJZG6QBREOG5IIDZID/
lists.fedoraproject.org/archives/list/[email protected]/message/FZCNPSRPGFCQRYE2BI4D4Q4SCE56ANV2/
lists.fedoraproject.org/archives/list/[email protected]/message/LPRVHW4J4ZCPPOHZEWP5MOJT7XDGFFPJ/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
security.gentoo.org/glsa/202208-23
www.debian.org/security/2021/dsa-4977
xenbits.xenproject.org/xsa/advisory-378.txt