First published: Tue Nov 23 2010(Updated: )
If the frontend pass a bad index of production request, the backend will enter an endless loop and then cause a excessive CPU consumption. This issue has been fixed in upstream by: changeset: 391:77f831cbb91d user: Keir Fraser <keir.fraser> date: Fri Jan 18 16:52:25 2008 +0000 summary: blkback: Request-processing loop is unbounded and hence requires a <a href="http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d">http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d</a> changeset: 392:7070d34f251c user: Keir Fraser <keir.fraser> date: Mon Jan 21 11:43:31 2008 +0000 summary: blkback/blktap: Check for kthread_should_stop() in inner loop, <a href="http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c">http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c</a> Version-Release number of selected component (if applicable): 2.6.18-194.el5xen How reproducible: Steps to Reproduce: 1. build a guest kernel with the patch attached. 2. run domU with the patched kernel Actual results: Dom0 got hung. Expected results: Dom0 shouldn't be impacted by a bad guest.
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Hypervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-656206 is high due to excessive CPU consumption caused by an endless loop.
To fix REDHAT-BUG-656206, ensure you update to the patched version of the Xen Hypervisor that includes the fix implemented by the upstream changeset.
REDHAT-BUG-656206 affects the Xen Hypervisor running on Red Hat systems.
The issue in REDHAT-BUG-656206 occurs when the frontend passes a bad index in a production request, leading to an endless loop.
The fix for REDHAT-BUG-656206 was developed by Keir Fraser as part of the upstream changeset.