Upstream information

CVE-2020-29480 at MITRE

Description

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 2.3 3.8
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Access Vector Local Local
Access Complexity Low Low
Privileges Required High Low
User Interaction None None
Scope Unchanged Changed
Confidentiality Impact Low Low
Integrity Impact None None
Availability Impact None None
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entries: 1178658 [RESOLVED / FIXED], 1179496 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
HPE Helion Openstack 8
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
HPE-Helion-OpenStack-8-2020-3945
Image SLES15-EC2-CHOST-HVM-BYOS
  • xen-libs >= 4.10.4_24-3.53.1
  • xen-tools-domU >= 4.10.4_24-3.53.1
Image SLES15-SP1-CHOST-BYOS-EC2
  • xen-libs >= 4.12.4_06-3.40.1
  • xen-tools-domU >= 4.12.4_06-3.40.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
Image SLES15-SP2-CHOST-BYOS-Azure
Image SLES15-SP2-CHOST-BYOS-GCE
  • xen-libs >= 4.13.2_06-3.22.1
Image SLES15-SP2-CHOST-BYOS-EC2
  • xen-libs >= 4.13.2_06-3.22.1
  • xen-tools-domU >= 4.13.2_06-3.22.1
SUSE Enterprise Storage 5
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-Storage-5-2020-3945
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
  • xen >= 4.10.4_24-3.53.1
  • xen-devel >= 4.10.4_24-3.53.1
  • xen-libs >= 4.10.4_24-3.53.1
  • xen-tools >= 4.10.4_24-3.53.1
  • xen-tools-domU >= 4.10.4_24-3.53.1
Patchnames:
SUSE-SLE-Product-HPC-15-2020-3916
SUSE Linux Enterprise Module for Basesystem 15 SP1
  • xen >= 4.12.4_06-3.40.1
  • xen-libs >= 4.12.4_06-3.40.1
  • xen-tools-domU >= 4.12.4_06-3.40.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP1-2020-3881
SUSE Linux Enterprise Module for Basesystem 15 SP2
  • xen >= 4.13.2_06-3.22.1
  • xen-libs >= 4.13.2_06-3.22.1
  • xen-tools-domU >= 4.13.2_06-3.22.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP2-2020-3915
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1
  • xen >= 4.12.4_06-3.40.1
  • xen-devel >= 4.12.4_06-3.40.1
  • xen-doc-html >= 4.12.4_06-3.40.1
  • xen-libs >= 4.12.4_06-3.40.1
  • xen-libs-32bit >= 4.12.4_06-3.40.1
  • xen-tools >= 4.12.4_06-3.40.1
  • xen-tools-domU >= 4.12.4_06-3.40.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-3881
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2
  • xen >= 4.13.2_06-3.22.1
  • xen-devel >= 4.13.2_06-3.22.1
  • xen-doc-html >= 4.13.2_06-3.22.1
  • xen-libs >= 4.13.2_06-3.22.1
  • xen-libs-32bit >= 4.13.2_06-3.22.1
  • xen-tools >= 4.13.2_06-3.22.1
  • xen-tools-domU >= 4.13.2_06-3.22.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-3915
SUSE Linux Enterprise Module for Server Applications 15 SP1
  • xen >= 4.12.4_06-3.40.1
  • xen-devel >= 4.12.4_06-3.40.1
  • xen-tools >= 4.12.4_06-3.40.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP1-2020-3881
SUSE Linux Enterprise Module for Server Applications 15 SP2
  • xen >= 4.13.2_06-3.22.1
  • xen-devel >= 4.13.2_06-3.22.1
  • xen-tools >= 4.13.2_06-3.22.1
  • xen-tools-xendomains-wait-disk >= 4.13.2_06-3.22.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP2-2020-3915
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-SLE-POS-12-SP2-CLIENT-2020-3913
SUSE Linux Enterprise Server 11 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 11 SP4-LTSS
  • xen >= 4.4.4_48-61.61.1
  • xen-doc-html >= 4.4.4_48-61.61.1
  • xen-kmp-default >= 4.4.4_48_3.0.101_108.117-61.61.1
  • xen-kmp-pae >= 4.4.4_48_3.0.101_108.117-61.61.1
  • xen-libs >= 4.4.4_48-61.61.1
  • xen-libs-32bit >= 4.4.4_48-61.61.1
  • xen-tools >= 4.4.4_48-61.61.1
  • xen-tools-domU >= 4.4.4_48-61.61.1
Patchnames:
slessp4-xen-14578
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-BCL-2020-3913
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server for SAP Applications 12 SP2-ESPOS
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-ESPOS-2020-3913
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2020-3913
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server for SAP Applications 12 SP3-BCL
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-BCL-2020-3945
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server for SAP Applications 12 SP3-ESPOS
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-ESPOS-2020-3945
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP3-LTSS
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-2020-3945
SUSE Linux Enterprise Server 12 SP4-ESPOS
SUSE Linux Enterprise Server for SAP Applications 12 SP4-ESPOS
  • xen >= 4.11.4_16-2.48.1
  • xen-doc-html >= 4.11.4_16-2.48.1
  • xen-libs >= 4.11.4_16-2.48.1
  • xen-libs-32bit >= 4.11.4_16-2.48.1
  • xen-tools >= 4.11.4_16-2.48.1
  • xen-tools-domU >= 4.11.4_16-2.48.1
Patchnames:
SUSE-SLE-SERVER-12-SP4-ESPOS-2020-3914
SUSE Linux Enterprise Server 12 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP4-LTSS
  • xen >= 4.11.4_16-2.48.1
  • xen-doc-html >= 4.11.4_16-2.48.1
  • xen-libs >= 4.11.4_16-2.48.1
  • xen-libs-32bit >= 4.11.4_16-2.48.1
  • xen-tools >= 4.11.4_16-2.48.1
  • xen-tools-domU >= 4.11.4_16-2.48.1
Patchnames:
SUSE-SLE-SERVER-12-SP4-LTSS-2020-3914
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
  • xen >= 4.12.4_06-3.36.1
  • xen-doc-html >= 4.12.4_06-3.36.1
  • xen-libs >= 4.12.4_06-3.36.1
  • xen-libs-32bit >= 4.12.4_06-3.36.1
  • xen-tools >= 4.12.4_06-3.36.1
  • xen-tools-domU >= 4.12.4_06-3.36.1
Patchnames:
SUSE-SLE-SERVER-12-SP5-2020-3880
SUSE Linux Enterprise Server 15-LTSS
  • xen >= 4.10.4_24-3.53.1
  • xen-devel >= 4.10.4_24-3.53.1
  • xen-libs >= 4.10.4_24-3.53.1
  • xen-tools >= 4.10.4_24-3.53.1
  • xen-tools-domU >= 4.10.4_24-3.53.1
Patchnames:
SUSE-SLE-Product-SLES-15-2020-3916
SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-SLE-SAP-12-SP2-2020-3913
SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-SLE-SAP-12-SP3-2020-3945
SUSE Linux Enterprise Server for SAP Applications 12 SP4
  • xen >= 4.11.4_16-2.48.1
  • xen-doc-html >= 4.11.4_16-2.48.1
  • xen-libs >= 4.11.4_16-2.48.1
  • xen-libs-32bit >= 4.11.4_16-2.48.1
  • xen-tools >= 4.11.4_16-2.48.1
  • xen-tools-domU >= 4.11.4_16-2.48.1
Patchnames:
SUSE-SLE-SAP-12-SP4-2020-3914
SUSE Linux Enterprise Server for SAP Applications 15
  • xen >= 4.10.4_24-3.53.1
  • xen-devel >= 4.10.4_24-3.53.1
  • xen-libs >= 4.10.4_24-3.53.1
  • xen-tools >= 4.10.4_24-3.53.1
  • xen-tools-domU >= 4.10.4_24-3.53.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-2020-3916
SUSE Linux Enterprise Software Development Kit 12 SP5
  • xen >= 4.12.4_06-3.36.1
  • xen-devel >= 4.12.4_06-3.36.1
Patchnames:
SUSE-SLE-SDK-12-SP5-2020-3880
SUSE OpenStack Cloud 7
  • xen >= 4.7.6_14-43.73.1
  • xen-doc-html >= 4.7.6_14-43.73.1
  • xen-libs >= 4.7.6_14-43.73.1
  • xen-libs-32bit >= 4.7.6_14-43.73.1
  • xen-tools >= 4.7.6_14-43.73.1
  • xen-tools-domU >= 4.7.6_14-43.73.1
Patchnames:
SUSE-OpenStack-Cloud-7-2020-3913
SUSE OpenStack Cloud 8
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-OpenStack-Cloud-8-2020-3945
SUSE OpenStack Cloud 9
  • xen >= 4.11.4_16-2.48.1
  • xen-doc-html >= 4.11.4_16-2.48.1
  • xen-libs >= 4.11.4_16-2.48.1
  • xen-libs-32bit >= 4.11.4_16-2.48.1
  • xen-tools >= 4.11.4_16-2.48.1
  • xen-tools-domU >= 4.11.4_16-2.48.1
Patchnames:
SUSE-OpenStack-Cloud-9-2020-3914
SUSE OpenStack Cloud Crowbar 8
  • xen >= 4.9.4_16-3.80.1
  • xen-doc-html >= 4.9.4_16-3.80.1
  • xen-libs >= 4.9.4_16-3.80.1
  • xen-libs-32bit >= 4.9.4_16-3.80.1
  • xen-tools >= 4.9.4_16-3.80.1
  • xen-tools-domU >= 4.9.4_16-3.80.1
Patchnames:
SUSE-OpenStack-Cloud-Crowbar-8-2020-3945
SUSE OpenStack Cloud Crowbar 9
  • xen >= 4.11.4_16-2.48.1
  • xen-doc-html >= 4.11.4_16-2.48.1
  • xen-libs >= 4.11.4_16-2.48.1
  • xen-libs-32bit >= 4.11.4_16-2.48.1
  • xen-tools >= 4.11.4_16-2.48.1
  • xen-tools-domU >= 4.11.4_16-2.48.1
Patchnames:
SUSE-OpenStack-Cloud-Crowbar-9-2020-3914
openSUSE Leap 15.1
  • xen >= 4.12.4_06-lp151.2.36.1
  • xen-debugsource >= 4.12.4_06-lp151.2.36.1
  • xen-devel >= 4.12.4_06-lp151.2.36.1
  • xen-doc-html >= 4.12.4_06-lp151.2.36.1
  • xen-libs >= 4.12.4_06-lp151.2.36.1
  • xen-libs-32bit >= 4.12.4_06-lp151.2.36.1
  • xen-libs-32bit-debuginfo >= 4.12.4_06-lp151.2.36.1
  • xen-libs-debuginfo >= 4.12.4_06-lp151.2.36.1
  • xen-tools >= 4.12.4_06-lp151.2.36.1
  • xen-tools-debuginfo >= 4.12.4_06-lp151.2.36.1
  • xen-tools-domU >= 4.12.4_06-lp151.2.36.1
  • xen-tools-domU-debuginfo >= 4.12.4_06-lp151.2.36.1
Patchnames:
openSUSE-2020-2313
openSUSE Leap 15.2
  • xen >= 4.13.2_06-lp152.2.21.1
  • xen-debugsource >= 4.13.2_06-lp152.2.21.1
  • xen-devel >= 4.13.2_06-lp152.2.21.1
  • xen-doc-html >= 4.13.2_06-lp152.2.21.1
  • xen-libs >= 4.13.2_06-lp152.2.21.1
  • xen-libs-32bit >= 4.13.2_06-lp152.2.21.1
  • xen-libs-32bit-debuginfo >= 4.13.2_06-lp152.2.21.1
  • xen-libs-debuginfo >= 4.13.2_06-lp152.2.21.1
  • xen-tools >= 4.13.2_06-lp152.2.21.1
  • xen-tools-debuginfo >= 4.13.2_06-lp152.2.21.1
  • xen-tools-domU >= 4.13.2_06-lp152.2.21.1
  • xen-tools-domU-debuginfo >= 4.13.2_06-lp152.2.21.1
  • xen-tools-xendomains-wait-disk >= 4.13.2_06-lp152.2.21.1
Patchnames:
openSUSE-2020-2331


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 xen Affected
SUSE Enterprise Storage 5 xen Unsupported
SUSE Linux Enterprise High Performance Computing 12 SP5 xen Released
SUSE Linux Enterprise High Performance Computing 15 LTSS xen Affected
SUSE Linux Enterprise Module for Basesystem 15 SP1 xen Released
SUSE Linux Enterprise Module for Basesystem 15 SP2 xen Released
SUSE Linux Enterprise Module for Server Applications 15 SP1 xen Released
SUSE Linux Enterprise Module for Server Applications 15 SP2 xen Released
SUSE Linux Enterprise Point of Service 11 SP3 xen Affected
SUSE Linux Enterprise Point of Service Image Server 12 xen Unsupported
SUSE Linux Enterprise Server 11 SP4 LTSS xen Affected
SUSE Linux Enterprise Server 12 SP2 BCL xen Affected
SUSE Linux Enterprise Server 12 SP2 ESPOS xen Unsupported
SUSE Linux Enterprise Server 12 SP2 LTSS xen Affected
SUSE Linux Enterprise Server 12 SP3 BCL xen Affected
SUSE Linux Enterprise Server 12 SP3 ESPOS xen Affected
SUSE Linux Enterprise Server 12 SP3 LTSS xen Affected
SUSE Linux Enterprise Server 12 SP4 ESPOS xen Affected
SUSE Linux Enterprise Server 12 SP4 LTSS xen Affected
SUSE Linux Enterprise Server 12 SP5 xen Released
SUSE Linux Enterprise Server 15 LTSS xen Affected
SUSE Linux Enterprise Server ESPOS 15 xen Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 xen Unsupported
SUSE Linux Enterprise Server for SAP Applications 12 SP3 xen Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 xen Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP5 xen Released
SUSE Linux Enterprise Server for SAP Applications 15 xen Affected
SUSE OpenStack Cloud 7 xen Affected
SUSE OpenStack Cloud 8 xen Affected
SUSE OpenStack Cloud 9 xen Affected
SUSE OpenStack Cloud Crowbar 8 xen Affected
SUSE OpenStack Cloud Crowbar 9 xen Affected