A security issue was found in the Linux kernel before version 5.11.11, as used by Xen. A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS).
A security issue was found in the Linux kernel before version 5.11.11, as used by Xen. A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS).
https://xenbits.xen.org/xsa/advisory-371.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.11&id=632b046bb6120afe1df1bfa06943bee338dd97db https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.27&id=3a1ca9bd4f5a647439e82e07b03d072781d9d180
Workaround ========== Avoiding the use of persistent grants will avoid the vulnerability. This can be achieved by passing the "feature_persistent=0" module option to the xen-blkback driver.