CVE Vulnerabilities

CVE-2020-11743

Improper Handling of Exceptional Conditions

Published: Apr 14, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

NameVendorStart VersionEnd Version
XenXen*4.13.0 (including)
XenXen4.13.0-rc1 (including)4.13.0-rc1 (including)
XenXen4.13.0-rc2 (including)4.13.0-rc2 (including)
XenUbuntubionic*
XenUbuntueoan*
XenUbuntuesm-apps/focal*
XenUbuntufocal*
XenUbuntugroovy*
XenUbuntuhirsute*
XenUbuntuimpish*
XenUbuntutrusty*
XenUbuntuxenial*

References