Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-25595

Опубликовано: 23 сент. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.1
CVSS3: 7.8

Описание

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec fun...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

4.11.4+37-g3263f257ca-1
esm-apps/focal

released

4.11.3+24-g14b62ab3e5-1ubuntu2.3
esm-apps/jammy

not-affected

4.11.4+37-g3263f257ca-1
esm-apps/noble

not-affected

4.11.4+37-g3263f257ca-1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needed

esm-infra/xenial

needed

focal

released

4.11.3+24-g14b62ab3e5-1ubuntu2.3
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 25%
0.00088
Низкий

6.1 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec fun...

CVSS3: 7.8
nvd
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec functi

CVSS3: 7.8
debian
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. The PCI passthrough cod ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec fun...

suse-cvrf
больше 5 лет назад

Security update for xen

EPSS

Процентиль: 25%
0.00088
Низкий

6.1 Medium

CVSS2

7.8 High

CVSS3