#VU49140 NULL pointer dereference in Xen - CVE-2020-29571

 

#VU49140 NULL pointer dereference in Xen - CVE-2020-29571

Published: December 15, 2020 / Updated: December 23, 2020


Vulnerability identifier: #VU49140
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-29571
CWE-ID: CWE-476
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Xen
Software vendor:
Xen Project

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.


Remediation

Install update from vendor's website.

External links