Vulnerability Name: | CVE-2020-29485 (CCN-193136) | ||||||||||||
Assigned: | 2020-12-15 | ||||||||||||
Published: | 2020-12-15 | ||||||||||||
Updated: | 2021-03-16 | ||||||||||||
Summary: | An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-29485 Source: XF Type: UNKNOWN xen-cve202029485-dos(193136) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-df772b417b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-64859a826b Source: DEBIAN Type: Third Party Advisory DSA-4812 Source: CCN Type: Xen Security Advisory XSA-330 oxenstored memory leak in reset_watches Source: MISC Type: Patch, Third Party Advisory https://xenbits.xenproject.org/xsa/advisory-330.txt | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |