Upstream information
Description
An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.9 |
Vector | AV:L/AC:L/Au:N/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 6.5 | 6.5 |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
Access Vector | Local | Local |
Access Complexity | Low | Low |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Changed | Changed |
Confidentiality Impact | None | None |
Integrity Impact | None | None |
Availability Impact | High | High |
CVSSv3 Version | 3.1 | 3.1 |
- SUSE-IU-2021:1-1, published Wed Feb 3 23:43:05 MST 2021
- SUSE-IU-2021:3-1, published Wed Feb 3 23:45:24 MST 2021
- SUSE-IU-2021:4-1, published Wed Feb 3 23:47:35 MST 2021
- SUSE-IU-2021:5-1, published Wed Feb 10 06:41:43 UTC 2021
- SUSE-IU-2021:7-1, published Wed Feb 10 06:48:24 UTC 2021
- SUSE-SU-2020:14578-1, published Wed Dec 16 13:18:24 MST 2020
- SUSE-SU-2020:3880-1, published Fri Dec 18 13:22:41 MST 2020
- SUSE-SU-2020:3881-1, published Fri Dec 18 13:21:03 MST 2020
- SUSE-SU-2020:3913-1, published Tue Dec 22 10:23:33 MST 2020
- SUSE-SU-2020:3914-1, published Tue Dec 22 10:25:17 MST 2020
- SUSE-SU-2020:3915-1, published Tue Dec 22 10:28:42 MST 2020
- SUSE-SU-2020:3916-1, published Tue Dec 22 10:21:53 MST 2020
- SUSE-SU-2020:3945-1, published Tue Dec 29 10:16:18 MST 2020
- openSUSE-SU-2020:2313-1, published Tue Feb 16 10:57:22 2021
- openSUSE-SU-2020:2331-1, published Tue Feb 16 10:57:22 2021
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
HPE Helion Openstack 8 |
| Patchnames: HPE-Helion-OpenStack-8-2020-3945 |
Image SLES15-EC2-CHOST-HVM-BYOS |
| |
Image SLES15-SP1-CHOST-BYOS-EC2 |
| |
Image SLES15-SP2-CHOST-BYOS-Aliyun Image SLES15-SP2-CHOST-BYOS-Azure Image SLES15-SP2-CHOST-BYOS-GCE |
| |
Image SLES15-SP2-CHOST-BYOS-EC2 |
| |
SUSE Enterprise Storage 5 |
| Patchnames: SUSE-Storage-5-2020-3945 |
SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS |
| Patchnames: SUSE-SLE-Product-HPC-15-2020-3916 |
SUSE Linux Enterprise Module for Basesystem 15 SP1 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP1-2020-3881 |
SUSE Linux Enterprise Module for Basesystem 15 SP2 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP2-2020-3915 |
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 |
| Patchnames: SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-3881 |
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2 |
| Patchnames: SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-3915 |
SUSE Linux Enterprise Module for Server Applications 15 SP1 |
| Patchnames: SUSE-SLE-Module-Server-Applications-15-SP1-2020-3881 |
SUSE Linux Enterprise Module for Server Applications 15 SP2 |
| Patchnames: SUSE-SLE-Module-Server-Applications-15-SP2-2020-3915 |
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT |
| Patchnames: SUSE-SLE-POS-12-SP2-CLIENT-2020-3913 |
SUSE Linux Enterprise Server 11 SP4-LTSS SUSE Linux Enterprise Server for SAP Applications 11 SP4-LTSS |
| Patchnames: slessp4-xen-14578 |
SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL |
| Patchnames: SUSE-SLE-SERVER-12-SP2-BCL-2020-3913 |
SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server for SAP Applications 12 SP2-ESPOS |
| Patchnames: SUSE-SLE-SERVER-12-SP2-ESPOS-2020-3913 |
SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS |
| Patchnames: SUSE-SLE-SERVER-12-SP2-2020-3913 |
SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server for SAP Applications 12 SP3-BCL |
| Patchnames: SUSE-SLE-SERVER-12-SP3-BCL-2020-3945 |
SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server for SAP Applications 12 SP3-ESPOS |
| Patchnames: SUSE-SLE-SERVER-12-SP3-ESPOS-2020-3945 |
SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server for SAP Applications 12 SP3-LTSS |
| Patchnames: SUSE-SLE-SERVER-12-SP3-2020-3945 |
SUSE Linux Enterprise Server 12 SP4-ESPOS SUSE Linux Enterprise Server for SAP Applications 12 SP4-ESPOS |
| Patchnames: SUSE-SLE-SERVER-12-SP4-ESPOS-2020-3914 |
SUSE Linux Enterprise Server 12 SP4-LTSS SUSE Linux Enterprise Server for SAP Applications 12 SP4-LTSS |
| Patchnames: SUSE-SLE-SERVER-12-SP4-LTSS-2020-3914 |
SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server for SAP Applications 12 SP5 |
| Patchnames: SUSE-SLE-SERVER-12-SP5-2020-3880 |
SUSE Linux Enterprise Server 15-LTSS |
| Patchnames: SUSE-SLE-Product-SLES-15-2020-3916 |
SUSE Linux Enterprise Server for SAP Applications 12 SP2 |
| Patchnames: SUSE-SLE-SAP-12-SP2-2020-3913 |
SUSE Linux Enterprise Server for SAP Applications 12 SP3 |
| Patchnames: SUSE-SLE-SAP-12-SP3-2020-3945 |
SUSE Linux Enterprise Server for SAP Applications 12 SP4 |
| Patchnames: SUSE-SLE-SAP-12-SP4-2020-3914 |
SUSE Linux Enterprise Server for SAP Applications 15 |
| Patchnames: SUSE-SLE-Product-SLES_SAP-15-2020-3916 |
SUSE Linux Enterprise Software Development Kit 12 SP5 |
| Patchnames: SUSE-SLE-SDK-12-SP5-2020-3880 |
SUSE OpenStack Cloud 7 |
| Patchnames: SUSE-OpenStack-Cloud-7-2020-3913 |
SUSE OpenStack Cloud 8 |
| Patchnames: SUSE-OpenStack-Cloud-8-2020-3945 |
SUSE OpenStack Cloud 9 |
| Patchnames: SUSE-OpenStack-Cloud-9-2020-3914 |
SUSE OpenStack Cloud Crowbar 8 |
| Patchnames: SUSE-OpenStack-Cloud-Crowbar-8-2020-3945 |
SUSE OpenStack Cloud Crowbar 9 |
| Patchnames: SUSE-OpenStack-Cloud-Crowbar-9-2020-3914 |
openSUSE Leap 15.1 |
| Patchnames: openSUSE-2020-2313 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE-2020-2331 |
First public cloud image revisions this CVE is fixed in:
- alibaba/sles-15-sp2-chost-byos-v20210202
- alibaba/sles-15-sp2-chost-byos-v20210304
- amazon/suse-manager-4-0-proxy-byos-v20210215-hvm-ssd-x86_64
- amazon/suse-manager-4-0-server-byos-v20210215-hvm-ssd-x86_64
- amazon/suse-manager-4-1-proxy-byos-v20210212-hvm-ssd-x86_64
- amazon/suse-manager-4-1-server-byos-v20210212-hvm-ssd-x86_64
- amazon/suse-sles-12-sp3-byos-v20210217-hvm-ssd-x86_64
- amazon/suse-sles-12-sp4-byos-v20210217-hvm-ssd-x86_64
- amazon/suse-sles-12-sp5-byos-v20210215-hvm-ssd-x86_64
- amazon/suse-sles-12-sp5-v20210212-hvm-ssd-x86_64
- amazon/suse-sles-12-sp5-v20210216-ecs-hvm-ssd-x86_64
- amazon/suse-sles-15-byos-v20210216-hvm-ssd-arm64
- amazon/suse-sles-15-byos-v20210216-hvm-ssd-x86_64
- amazon/suse-sles-15-sp1-byos-v20210220-hvm-ssd-x86_64
- amazon/suse-sles-15-sp1-byos-v20210221-hvm-ssd-arm64
- amazon/suse-sles-15-sp1-chost-byos-v20210202-hvm-ssd-x86_64
- amazon/suse-sles-15-sp1-sapcal-v20210216-hvm-ssd-x86_64
- amazon/suse-sles-15-sp2-byos-v20210212-hvm-ssd-arm64
- amazon/suse-sles-15-sp2-byos-v20210212-hvm-ssd-x86_64
- amazon/suse-sles-15-sp2-chost-byos-v20210202-hvm-ssd-x86_64
- amazon/suse-sles-15-sp2-v20210212-hvm-ssd-arm64
- amazon/suse-sles-15-sp2-v20210212-hvm-ssd-x86_64
- amazon/suse-sles-15-sp2-v20210216-ecs-hvm-ssd-x86_64
- amazon/suse-sles-15-sp2-v20210303-ecs-hvm-ssd-x86_64
- amazon/suse-sles-hpc-15-sp1-byos-v20210216-hvm-ssd-x86_64
- amazon/suse-sles-hpc-15-sp2-byos-v20210212-hvm-ssd-x86_64
- amazon/suse-sles-sap-12-sp3-byos-v20210217-hvm-ssd-x86_64
- amazon/suse-sles-sap-12-sp4-byos-v20210217-hvm-ssd-x86_64
- amazon/suse-sles-sap-12-sp5-byos-v20210215-hvm-ssd-x86_64
- amazon/suse-sles-sap-15-byos-v20210216-hvm-ssd-x86_64
- amazon/suse-sles-sap-15-sp1-byos-v20210221-hvm-ssd-x86_64
- amazon/suse-sles-sap-15-sp2-byos-v20210212-hvm-ssd-x86_64
- google/sles-12-sp3-sap-byos-v20210210
- google/sles-12-sp3-sap-v20210210
- google/sles-15-sp2-byos-v20210204
- google/sles-15-sp2-chost-byos-v20210202
- google/sles-15-sp2-sap-byos-v20210204
- google/sles-15-sp2-sap-v20210204
- google/sles-15-sp2-v20210204
- google/suse-manager-4-1-proxy-byos-v20210209
- google/suse-manager-4-1-server-byos-v20210209
- oracle/sles-15-sp2-byos-v20210303
- oracle/sles-15-sp2-sap-byos-v20210303
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
HPE Helion OpenStack 8 | xen | Affected |
SUSE Enterprise Storage 5 | xen | Affected |
SUSE Linux Enterprise High Performance Computing 12 SP5 | xen | Released |
SUSE Linux Enterprise High Performance Computing 15 LTSS | xen | Affected |
SUSE Linux Enterprise Module for Basesystem 15 SP1 | xen | Released |
SUSE Linux Enterprise Module for Basesystem 15 SP2 | xen | Released |
SUSE Linux Enterprise Module for Server Applications 15 SP1 | xen | Released |
SUSE Linux Enterprise Module for Server Applications 15 SP2 | xen | Released |
SUSE Linux Enterprise Point of Service 11 SP3 | xen | Unsupported |
SUSE Linux Enterprise Point of Service Image Server 12 | xen | Affected |
SUSE Linux Enterprise Server 11 SP4 LTSS | xen | Affected |
SUSE Linux Enterprise Server 12 SP2 BCL | xen | Affected |
SUSE Linux Enterprise Server 12 SP2 ESPOS | xen | Affected |
SUSE Linux Enterprise Server 12 SP2 LTSS | xen | Affected |
SUSE Linux Enterprise Server 12 SP3 BCL | xen | Affected |
SUSE Linux Enterprise Server 12 SP3 ESPOS | xen | Affected |
SUSE Linux Enterprise Server 12 SP3 LTSS | xen | Affected |
SUSE Linux Enterprise Server 12 SP4 ESPOS | xen | Affected |
SUSE Linux Enterprise Server 12 SP4 LTSS | xen | Affected |
SUSE Linux Enterprise Server 12 SP5 | xen | Released |
SUSE Linux Enterprise Server 15 LTSS | xen | Affected |
SUSE Linux Enterprise Server ESPOS 15 | xen | Affected |
SUSE Linux Enterprise Server for SAP Applications 12 SP2 | xen | Affected |
SUSE Linux Enterprise Server for SAP Applications 12 SP3 | xen | Affected |
SUSE Linux Enterprise Server for SAP Applications 12 SP4 | xen | Affected |
SUSE Linux Enterprise Server for SAP Applications 12 SP5 | xen | Released |
SUSE Linux Enterprise Server for SAP Applications 15 | xen | Affected |
SUSE OpenStack Cloud 7 | xen | Affected |
SUSE OpenStack Cloud 8 | xen | Affected |
SUSE OpenStack Cloud 9 | xen | Affected |
SUSE OpenStack Cloud Crowbar 8 | xen | Affected |
SUSE OpenStack Cloud Crowbar 9 | xen | Affected |