Advisory Published
Updated

CVE-2020-11742

First published: Tue Apr 14 2020(Updated: )

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Xen Xen<=4.13.0
Xen Xen=4.13.0-rc1
Xen Xen=4.13.0-rc2
Fedoraproject Fedora=32
debian/xen
4.14.6-1
4.14.5+94-ge49571868d-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+36-g54dacb5c02-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-11742?

    CVE-2020-11742 is a vulnerability that allows guest OS users to cause a denial of service in Xen through 4.13.x due to bad continuation handling in GNTTABOP_copy.

  • How does CVE-2020-11742 affect Xen?

    CVE-2020-11742 affects Xen through 4.13.x, allowing guest OS users to cause a denial of service.

  • How can guest OS users exploit CVE-2020-11742?

    Guest OS users can exploit CVE-2020-11742 by taking advantage of the bad continuation handling in GNTTABOP_copy, leading to a denial of service.

  • What is the recommended remedy for CVE-2020-11742 on Ubuntu?

    The recommended remedy for CVE-2020-11742 on Ubuntu is to update to Xen version 4.11.3+24- or higher.

  • What is the recommended remedy for CVE-2020-11742 on Debian?

    The recommended remedy for CVE-2020-11742 on Debian is to update to Xen version 4.11.4+107-gef32c7afa2-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2-1.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203