Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-29569
HistoryDec 15, 2020 - 12:00 a.m.

CVE-2020-29569

2020-12-1500:00:00
ubuntu.com
ubuntu.com
28

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

13.3%

An issue was discovered in the Linux kernel through 5.10.1, as used with
Xen through 4.14.x. The Linux kernel PV block backend expects the kernel
thread handler to reset ring->xenblkd to NULL when stopped. However, the
handler may not have time to run if the frontend quickly toggles between
the states connect and disconnect. As a consequence, the block backend may
re-use a pointer after it was freed. A misbehaving guest can trigger a dom0
crash by continuously connecting / disconnecting a block frontend.
Privilege escalation and information leaks cannot be ruled out. This only
affects systems with a Linux blkback.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchlinux-riscv-5.8< 5.8.0-17.19~20.04.1UNKNOWN
ubuntu20.10noarchlinux< 5.8.0-44.50UNKNOWN
ubuntu18.04noarchlinux< 4.15.0-136.140UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-66.74UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-204.236UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1094.101UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1038.40UNKNOWN
ubuntu20.10noarchlinux-aws< 5.8.0-1024.26UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1087.91) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1123.137UNKNOWN
Rows per page:
1-10 of 561

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

13.3%