Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-29480

Опубликовано: 15 дек. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1
CVSS3: 2.3

Описание

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

4.11.4+57-g41a822c392-2
esm-apps/focal

needed

esm-apps/jammy

not-affected

4.11.4+57-g41a822c392-2
esm-apps/noble

not-affected

4.11.4+57-g41a822c392-2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needed

esm-infra/xenial

needed

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 19%
0.00062
Низкий

2.1 Low

CVSS2

2.3 Low

CVSS3

Связанные уязвимости

CVSS3: 2.3
nvd
около 5 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. T

CVSS3: 2.3
debian
около 5 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implem ...

github
больше 3 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

CVSS3: 2.3
fstec
около 5 лет назад

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

suse-cvrf
около 5 лет назад

Security update for xen

EPSS

Процентиль: 19%
0.00062
Низкий

2.1 Low

CVSS2

2.3 Low

CVSS3