CVE-2020-29485Missing Release of Memory after Effective Lifetime in XEN

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 80.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 15
Latest updateMay 24

Description

An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/xen< xen 4.14.0+88-g1d1d1f5391-1 (bookworm)
Debianxen/xen< 4.14.0+88-g1d1d1f5391-1+3
NVDxen/xen4.6.04.14.0

Also affects: Debian Linux 10.0, Fedora 32, 33

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5x7q-6f7m-fc5c: An issue was discovered in Xen 42022-05-24
OSV
CVE-2020-29485: An issue was discovered in Xen 42020-12-15

📋Vendor Advisories

1
Debian
CVE-2020-29485: xen - An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_R...2020