| |
Vulnerability CVE-2020-29568
Published: 2020-12-15
Description: |
An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable. |
Type:
CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
4.9/10 |
6.9/10 |
3.9/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Complete |
References: |
https://xenbits.xenproject.org/xsa/advisory-349.html
|
|
|
Copyright 2024, cxsecurity.com
|
|
|