Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2020-29486
HistoryDec 15, 2020 - 6:15 p.m.

CVE-2020-29486

2020-12-1518:15:00
Debian Security Bug Tracker
security-tracker.debian.org
9

6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

13.4%

An issue was discovered in Xen through 4.14.x. Nodes in xenstore have an ownership. In oxenstored, a owner could give a node away. However, node ownership has quota implications. Any guest can run another guest out of quota, or create an unbounded number of nodes owned by dom0, thus running xenstored out of memory A malicious guest administrator can cause a denial of service against a specific guest or against the whole host. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.14.0+88-g1d1d1f5391-1xen_4.14.0+88-g1d1d1f5391-1_all.deb
Debian11allxen< 4.14.0+88-g1d1d1f5391-1xen_4.14.0+88-g1d1d1f5391-1_all.deb
Debian10allxen< 4.11.4+57-g41a822c392-2xen_4.11.4+57-g41a822c392-2_all.deb
Debian999allxen< 4.14.0+88-g1d1d1f5391-1xen_4.14.0+88-g1d1d1f5391-1_all.deb
Debian13allxen< 4.14.0+88-g1d1d1f5391-1xen_4.14.0+88-g1d1d1f5391-1_all.deb

6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

13.4%