First published: Tue Dec 15 2020(Updated: )
An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=4.6.0<=4.14.0 | |
Debian | =10.0 | |
Fedora | =32 | |
Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29485 is classified as a high severity vulnerability due to its potential to cause unbounded memory usage leading to a denial of service.
To remediate CVE-2020-29485, upgrade to a fixed version of Xen such as 4.11.4+107-gef32c7afa2-1 or higher.
CVE-2020-29485 affects systems using the Ocaml Xenstored implementation in Xen versions 4.6 through 4.14.x.
The impact of CVE-2020-29485 includes the possibility of a system-wide denial of service due to excessive memory consumption.
CVE-2020-29485 was published on December 1, 2020.