CVE-2020-29485 PUBLISHED

An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.

EPSS 0.06% · 19.4th percentile

Risk Scores

EPSS Score
0.06%
19.4th percentile

Affected Products

VendorProductVersions
Ubuntu:20.04:LTSxen0, 4.9.2-0ubuntu2, 4.9.2-0ubuntu6
Ubuntu:18.04:LTSxen4.9.2-0ubuntu1, 0, 4.9.0-0ubuntu3
Ubuntu:16.04:LTSxen4.6.0-1ubuntu2, 4.6.0-1ubuntu4, 4.6.0-1ubuntu4.1

Timeline

References

Open in Interactive Console →