A flaw was found in xen. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. The order of evaluation of subexpressions is not specified. This allows a malicious or buggy guest to write as many xenstore entriesas it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1616080]