CVE-2020-29570 PUBLISHED

An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.

EPSS 0.06% · 18.6th percentile

Risk Scores

EPSS Score
0.06%
18.6th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSxen0, 4.5.1-0ubuntu1, 4.5.1-0ubuntu2
Ubuntu:20.04:LTSxen4.11.3+24-g14b62ab3e5-1ubuntu2.3, 4.9.2-0ubuntu7, 4.11.3+24-g14b62ab3e5-1ubuntu1
Ubuntu:18.04:LTSxen4.9.0-0ubuntu3, 4.9.0-0ubuntu4, 4.9.2-0ubuntu1

Timeline

References

Open in Interactive Console →