CVE-2018-5244Improper Restriction of Operations within the Bounds of a Memory Buffer in XEN

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 81.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 5
Latest updateMay 14

Description

In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

Alpinexen/xen< 4.10.0-r1+8
NVDxen/xen
debiandebian/xen

🔴Vulnerability Details

2
GHSA
GHSA-3r9m-2j47-xq4r: In Xen 42022-05-14
OSV
CVE-2018-5244: In Xen 42018-01-05

📋Vendor Advisories

2
Red Hat
xen: memory leak with MSR emulation (XSA-253)2018-01-04
Debian
CVE-2018-5244: xen - In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR...2018

💬Community

2
Bugzilla
CVE-2018-5244 xen: memory leak with MSR emulation (XSA-253) [fedora-all]2018-01-04
Bugzilla
CVE-2018-5244 xen: memory leak with MSR emulation (XSA-253)2017-12-22