Vulnerability CVE-2020-29485


Published: 2020-12-15

Description:
An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.

Type:

CWE-401

(Improper Release of Memory Before Removing Last Reference ('Memory Leak'))

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
6.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
XEN -> XEN 
Debian -> Debian linux 

 References:
https://www.debian.org/security/2020/dsa-4812
https://xenbits.xenproject.org/xsa/advisory-330.txt

Copyright 2024, cxsecurity.com

 

Back to Top