CVE-2020-11739
Summary
| CVE | CVE-2020-11739 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-14 13:15:00 UTC |
| Updated | 2023-11-07 03:15:00 UTC |
| Description | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 30 Update: xen-4.11.4-1.fc30 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 32 Update: xen-4.13.0-7.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Xen: Multiple vulnerabilities (GLSA 202005-08) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| oss-security - Xen Security Advisory 314 v3 (CVE-2020-11739) - Missing memory
barriers in read-write unlock paths |
MLIST |
www.openwall.com |
Mailing List, Patch, Third Party Advisory |
| XSA-314 - Xen Security Advisories |
MISC |
xenbits.xen.org |
Patch, Vendor Advisory |
| [SECURITY] Fedora 32 Update: xen-4.13.0-7.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Third Party Advisory |
| [SECURITY] Fedora 30 Update: xen-4.11.4-1.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| XSA-314 - Xen Security Advisories |
CONFIRM |
xenbits.xen.org |
Patch, Vendor Advisory |
| [SECURITY] Fedora 31 Update: xen-4.12.2-3.fc31 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Debian -- Security Information -- DSA-4723-1 xen |
DEBIAN |
www.debian.org |
|
| [SECURITY] Fedora 31 Update: xen-4.12.2-3.fc31 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [security-announce] openSUSE-SU-2020:0599-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 198943 Ubuntu Security Notification for Xen Vulnerabilities (USN-5617-1)
- 500755 Alpine Linux Security Update for xen
- 500788 Alpine Linux Security Update for xen
- 501174 Alpine Linux Security Update for xen
- 504532 Alpine Linux Security Update for xen