Vigil@nce - Xen: memory leak via MMU_MACHPHYS_UPDATE
November 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can create a memory leak in MMU_MACHPHYS_UPDATE of
Xen, in order to trigger a denial of service.
Impacted products: Unix (platform)
Severity: 1/4
Creation date: 20/11/2014
DESCRIPTION OF THE VULNERABILITY
The Xen product uses the MMU_MACHPHYS_UPDATE query to update an
entry in a page table.
However, when an error occurs, the memory allocated to process
this operation is never freed.
An attacker can therefore create a memory leak in
MMU_MACHPHYS_UPDATE of Xen, in order to trigger a denial of
service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Xen-memory-leak-via-MMU-MACHPHYS-UPDATE-15682