CVE-2020-15563Improper Restriction of Operations within the Bounds of a Memory Buffer in XEN

Severity
6.5MEDIUMNVD
OSV5.5
EPSS
0.1%
top 77.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 7
Latest updateSep 19

Description

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages4 packages

Debianxen/xen< 4.11.4+24-gddaaccbbab-1+3
Ubuntuxen/xen< 4.11.3+24-g14b62ab3e5-1ubuntu2.3
NVDxen/xen4.8.04.13.1
NVDopensuse/leap15.2

Also affects: Debian Linux 10.0, Fedora 31, 32

Patches

🔴Vulnerability Details

4
OSV
xen vulnerabilities2022-09-19
GHSA
GHSA-wwfw-7rgm-hmmc: An issue was discovered in Xen through 42022-05-24
OSV
CVE-2020-15563: An issue was discovered in Xen through 42020-07-07
CVEList
CVE-2020-15563: An issue was discovered in Xen through 42020-07-07

📋Vendor Advisories

3
Ubuntu
Xen vulnerabilities2022-09-19
Red Hat
xen: inverted code paths in x86 dirty VRAM tracking leads to DoS (XSA-319)2020-07-07
Debian
CVE-2020-15563: xen - An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users t...2020

💬Community

2
Bugzilla
CVE-2020-15563 xen: inverted code paths in x86 dirty VRAM tracking leads to DoS (XSA-319) [fedora-all]2020-07-07
Bugzilla
CVE-2020-15563 xen: inverted code paths in x86 dirty VRAM tracking leads to DoS (XSA-319)2020-06-26
CVE-2020-15563 — XEN vulnerability | cvebase