CVE-2020-29485

An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-12-15 18:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-29485

Mitre link : CVE-2020-29485

CVE.ORG link : CVE-2020-29485


JSON object : View

Products Affected

xen

  • xen

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-401

Missing Release of Memory after Effective Lifetime