CVE-2020-25603

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.

References

https://xenbits.xen.org/xsa/advisory-340.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/4JRXMKEMQRQYWYEPHVBIWUEAVQ3LU4FN/

https://lists.fedoraproject.org/archives/list/[email protected]/message/DA633Y3G5KX7MKRN4PFEGM3IVTJMBEOM/

https://www.debian.org/security/2020/dsa-4769

http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/RJZERRBJN6E6STDCHT4JHP4MI6TKBCJE/

https://security.gentoo.org/glsa/202011-06

Details

Source: MITRE

Published: 2020-09-23

Updated: 2021-07-21

Type: CWE-401

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* versions up to 4.14.0 (inclusive)

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
150542SUSE SLES11 Security Update : xen (SUSE-SU-2020:14521-1)NessusSuSE Local Security Checks
medium
150180OracleVM 3.4 : xen (OVMSA-2021-0014)NessusOracleVM Local Security Checks
high
144856Xen Missing memory barriers DoS (XSA-340)NessusMisc.
high
143873SUSE SLES12 Security Update : xen (SUSE-SU-2020:2787-1)NessusSuSE Local Security Checks
medium
143853SUSE SLES12 Security Update : xen (SUSE-SU-2020:2788-1)NessusSuSE Local Security Checks
medium
143805SUSE SLES12 Security Update : xen (SUSE-SU-2020:2822-1)NessusSuSE Local Security Checks
medium
143707SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:2791-1)NessusSuSE Local Security Checks
medium
143685SUSE SLES12 Security Update : xen (SUSE-SU-2020:2786-1)NessusSuSE Local Security Checks
medium
143637SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:2790-1)NessusSuSE Local Security Checks
medium
142854GLSA-202011-06 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
141278Fedora 31 : xen (2020-d46fe34349)NessusFedora Local Security Checks
medium
141270Fedora 33 : xen (2020-306b84fd07)NessusFedora Local Security Checks
medium
141168openSUSE Security Update : xen (openSUSE-2020-1608)NessusSuSE Local Security Checks
medium
141138Debian DSA-4769-1 : xen - security updateNessusDebian Local Security Checks
medium
141102Fedora 32 : xen (2020-f668e579be)NessusFedora Local Security Checks
medium