[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-11743Date: (C)2020-04-14   (M)2024-02-22


An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score : 2.1
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
DSA-4723
FEDORA-2020-295ed0b1e0
FEDORA-2020-440457afe4
FEDORA-2020-cbc3149753
GLSA-202005-08
http://www.openwall.com/lists/oss-security/2020/04/14/3
http://xenbits.xen.org/xsa/advisory-316.html
https://xenbits.xen.org/xsa/advisory-316.html
openSUSE-SU-2020:0599

CWE    1
CWE-755
OVAL    10
oval:org.secpod.oval:def:66716
oval:org.secpod.oval:def:89000441
oval:org.secpod.oval:def:89000376
oval:org.secpod.oval:def:89050251
...

© SecPod Technologies