CVE-2020-29481
📋 TL;DR
This Xen vulnerability allows a newly created guest domain to inherit access rights to Xenstore nodes from previously destroyed domains with the same domain ID (domid). This can lead to unauthorized reading of sensitive information from other running guest domains. All Xen installations through version 4.14.x are affected.
💻 Affected Systems
- Xen Hypervisor
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Xen by Xen
⚠️ Risk & Real-World Impact
Worst Case
A malicious guest domain could read sensitive configuration data, credentials, or secrets from other guest domains, potentially leading to privilege escalation or data breach across the virtualization environment.
Likely Case
Information disclosure where new guests can access Xenstore entries of other running guests, potentially exposing configuration details or operational data.
If Mitigated
Limited impact if proper domain isolation and monitoring are in place, with no direct code execution or denial of service.
🎯 Exploit Status
Exploitation requires creating a new domain with the same domid as a previously destroyed domain and understanding Xenstore access patterns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Xen 4.14.1 and later
Vendor Advisory: https://xenbits.xenproject.org/xsa/advisory-322.html
Restart Required: Yes
Instructions:
1. Update Xen to version 4.14.1 or later. 2. Apply vendor-specific patches for your distribution. 3. Reboot the hypervisor host to load the updated Xen components.
🔧 Temporary Workarounds
Avoid domain ID reuse
linuxPrevent new domains from reusing the same domid as previously destroyed domains
Configure Xen to use unique domain IDs and avoid recycling IDs
🧯 If You Can't Patch
- Implement strict monitoring of Xenstore access patterns and domain creation events
- Isolate sensitive guest domains from potentially malicious guests using separate virtualization clusters
🔍 How to Verify
Check if Vulnerable:
Check Xen version with 'xl info' or 'xm info' and verify if it's 4.14.x or earlier
Check Version:
xl info | grep xen_version || xm info | grep xen_version
Verify Fix Applied:
Verify Xen version is 4.14.1 or later using 'xl info' or 'xm info'
📡 Detection & Monitoring
Log Indicators:
- Unusual Xenstore access patterns
- Domain creation events with reused domain IDs
- Access violations in Xenstore logs
Network Indicators:
- None - this is a hypervisor-level vulnerability
SIEM Query:
Search for Xen hypervisor logs showing domain creation with previously used domain IDs or unauthorized Xenstore access attempts
🔗 References
- http://www.openwall.com/lists/oss-security/2020/12/16/3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2C6M6S3CIMEBACH6O7V4H2VDANMO6TVA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBLV6L6Q24PPQ2CRFXDX4Q76KU776GKI/
- https://www.debian.org/security/2020/dsa-4812
- https://xenbits.xenproject.org/xsa/advisory-322.html
- http://www.openwall.com/lists/oss-security/2020/12/16/3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2C6M6S3CIMEBACH6O7V4H2VDANMO6TVA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBLV6L6Q24PPQ2CRFXDX4Q76KU776GKI/
- https://www.debian.org/security/2020/dsa-4812
- https://xenbits.xenproject.org/xsa/advisory-322.html