SB2020102220 - Race condition in Xen
Published: October 22, 2020 Updated: January 24, 2021
Security Bulletin ID
SB2020102220
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2020-27672)
The vulnerability allows a local authenticated user to execute arbitrary code.
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
- http://www.openwall.com/lists/oss-security/2021/01/19/7
- http://xenbits.xen.org/xsa/advisory-345.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/
- https://security.gentoo.org/glsa/202011-06
- https://www.debian.org/security/2020/dsa-4804
- https://xenbits.xen.org/xsa/advisory-345.html