8.8
CWE
416
Advisory Published
Updated

CVE-2020-29569: Use After Free

First published: Tue Dec 15 2020(Updated: )

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Xen xen-unstable<=4.14.1
Linux Kernel>=4.1.44<4.2
Linux Kernel>=4.4.80<4.4.254
Linux Kernel>=4.9.36<4.9.249
Linux Kernel>=4.11.9<4.12
Linux Kernel>=4.12<4.14.213
Linux Kernel>=4.15<4.19.164
Linux Kernel>=4.20<5.4.86
Linux Kernel>=5.5<5.10.4
All of
NetApp HCI Compute Node BIOS
netapp hci compute node
netapp solidfire \& hci management node
netapp solidfire \& hci storage node
Debian GNU/Linux=9.0
Debian GNU/Linux=10.0
NetApp HCI Compute Node BIOS
netapp hci compute node
debian/linux
5.10.223-1
5.10.226-1
6.1.123-1
6.1.128-1
6.12.12-1
6.12.15-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-29569?

    The severity of CVE-2020-29569 is classified as moderate to high, depending on the specific environment and configuration.

  • How do I fix CVE-2020-29569?

    To fix CVE-2020-29569, upgrade the affected package to version 5.10.223-1 or higher.

  • Which systems are affected by CVE-2020-29569?

    CVE-2020-29569 affects specific versions of the Linux kernel from 4.1.44 up to 5.10.1, along with certain Xen releases.

  • What happens if CVE-2020-29569 is exploited?

    Exploitation of CVE-2020-29569 could lead to a denial of service or potential information leakage in the affected systems.

  • Is there a workaround for CVE-2020-29569?

    As an interim workaround for CVE-2020-29569, it is suggested to restrict the use of vulnerable versions until an update can be applied.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203