The fix for XSA-365 includes initialization of pointers such that
subsequent cleanup code wouldn't use uninitialized or stale values.
This initialization went too far and may under certain conditions also
overwrite pointers which are in need of cleaning up. The lack of
cleanup would result in leaking persistent grants. The leak in turn
would prevent fully cleaning up after a respective guest has died,
leaving around zombie domains.
A malicious or buggy frontend driver may be able to cause resource leaks
from the corresponding backend driver. This can result in a host-wide
Denial of Sevice (DoS).
Reconfiguring guests to use alternative (e.g. qemu-based) backends may
avoid the vulnerability.
Avoiding the use of persistent grants will also avoid the vulnerability.
This can be achieved by passing the "feature_persistent=0" module option
to the xen-blkback driver.
Created xen tracking bugs for this issue:
Affects: fedora-all [bug 1945664]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.
This was fixed for Fedora with the 5.11.11 stable kernel updates.