Race condition in Xen



Published: 2020-10-22 | Updated: 2021-01-24
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-27672
CWE-ID CWE-362
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Xen
Server applications / Virtualization software

Vendor Xen Project

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Race condition

EUVDB-ID: #VU49941

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-27672

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.0.0 - 4.14.1


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
http://www.openwall.com/lists/oss-security/2021/01/19/7
http://xenbits.xen.org/xsa/advisory-345.html
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/
http://security.gentoo.org/glsa/202011-06
http://www.debian.org/security/2020/dsa-4804
http://xenbits.xen.org/xsa/advisory-345.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###