Severity
7.8HIGHNVD
EPSS
0.1%
top 78.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 23
Latest updateSep 19

Description

An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege esc

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Debianxen/xen< 4.14.0+80-gd101b417b7-1+3
NVDxen/xen4.14.0
NVDopensuse/leap15.2

Also affects: Debian Linux 10.0, Fedora 31, 32, 33

Patches

🔴Vulnerability Details

3
GHSA
GHSA-27c2-9cc9-22v7: An issue was discovered in Xen through 42022-05-24
OSV
CVE-2020-25603: An issue was discovered in Xen through 42020-09-23
CVEList
CVE-2020-25603: An issue was discovered in Xen through 42020-09-23

📋Vendor Advisories

3
Ubuntu
Xen vulnerabilities2022-09-19
Red Hat
xen: missing memory barriers when accessing/allocating an event channel (XSA-340)2020-09-22
Debian
CVE-2020-25603: xen - An issue was discovered in Xen through 4.14.x. There are missing memory barriers...2020

💬Community

2
Bugzilla
CVE-2020-25603 xen: missing memory barriers when accessing/allocating an event channel (XSA-340) [fedora-all]2020-09-22
Bugzilla
CVE-2020-25603 xen: missing memory barriers when accessing/allocating an event channel (XSA-340)2020-09-09
CVE-2020-25603 — XEN vulnerability | cvebase