CVE-2020-29568

Name
CVE-2020-29568
Description
An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://xenbits.xenproject.org/xsa/advisory-349.html
Third Party Advisory https://www.debian.org/security/2021/dsa-4843
Mailing List https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
Mailing List https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
GENTOO https://security.gentoo.org/glsa/202107-30

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* xen >= None <= 4.14.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen 3.10-main 4.12.4-r0 None possibly vulnerable
xen 3.11-main 4.13.4-r2 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.12-main 4.13.4-r3 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable