Resource exhaustion in Linux kernel - CVE-2019-17351
Published: July 28, 2020
Linux kernel
Linux Foundation
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
An issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
External links
- http://www.openwall.com/lists/oss-security/2019/10/25/9
- http://xenbits.xen.org/xsa/advisory-300.html
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
- https://github.com/torvalds/linux/commit/6ef36ab967c71690ebe7e5ef997a8be4da3bc844
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://usn.ubuntu.com/4286-1/
- https://usn.ubuntu.com/4286-2/
- https://xenbits.xen.org/xsa/advisory-300.html