Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-29566
HistoryDec 15, 2020 - 12:00 a.m.

CVE-2020-29566

2020-12-1500:00:00
ubuntu.com
ubuntu.com
6

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

18.0%

An issue was discovered in Xen through 4.14.x. When they require assistance
from the device model, x86 HVM guests must be temporarily de-scheduled. The
device model will signal Xen when it has completed its operation, via an
event channel, so that the relevant vCPU is rescheduled. If the device
model were to signal Xen without having actually completed the operation,
the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is
resignalled very quickly, the re-schedule may occur before the de-schedule
was fully complete, triggering a shortcut. This potentially repeating
process uses ordinary recursive function calls, and thus could result in a
stack overflow. A malicious or buggy stubdomain serving a HVM guest can
cause Xen to crash, resulting in a Denial of Service (DoS) to the entire
host. Only x86 systems are affected. Arm systems are not affected. Only x86
stubdomains serving HVM guests can exploit the vulnerability.

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchxen< anyUNKNOWN
ubuntu20.04noarchxen< anyUNKNOWN
ubuntu16.04noarchxen< anyUNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

18.0%