{"vulnerability": "CVE-2020-29568", "sightings": [{"uuid": "aa6bfdb8-f092-46da-86a3-b83b8b2db948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29568", "type": "seen", "source": "https://t.me/cibsecurity/20857", "content": "\u203c CVE-2020-29568 \u203c\n\nAn issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-15T20:46:32.000000Z"}]}