CVE-2020-15563

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/07/07/3 Mailing List Third Party Advisory
http://xenbits.xen.org/xsa/advisory-319.html Patch Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/
https://security.gentoo.org/glsa/202007-02 Third Party Advisory
https://www.debian.org/security/2020/dsa-4723 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/07/07/3 Mailing List Third Party Advisory
http://xenbits.xen.org/xsa/advisory-319.html Patch Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/
https://security.gentoo.org/glsa/202007-02 Third Party Advisory
https://www.debian.org/security/2020/dsa-4723 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/07/07/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/07/07/3 - Mailing List, Third Party Advisory
References () http://xenbits.xen.org/xsa/advisory-319.html - Patch, Vendor Advisory () http://xenbits.xen.org/xsa/advisory-319.html - Patch, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/ -
References () https://security.gentoo.org/glsa/202007-02 - Third Party Advisory () https://security.gentoo.org/glsa/202007-02 - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4723 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4723 - Third Party Advisory

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/', 'name': 'FEDORA-2020-fbc13516af', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/', 'name': 'FEDORA-2020-76cf2b0f0a', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/ -

Information

Published : 2020-07-07 13:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15563

Mitre link : CVE-2020-15563

CVE.ORG link : CVE-2020-15563


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap

xen

  • xen

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer