Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-25601

Опубликовано: 23 сент. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 5.5

Описание

An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

4.11.4+37-g3263f257ca-1
esm-apps/focal

released

4.11.3+24-g14b62ab3e5-1ubuntu2.3
esm-apps/jammy

not-affected

4.11.4+37-g3263f257ca-1
esm-apps/noble

not-affected

4.11.4+37-g3263f257ca-1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needed

esm-infra/xenial

needed

focal

released

4.11.3+24-g14b62ab3e5-1ubuntu2.3
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 23%
0.00076
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
redhat
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.

CVSS3: 5.5
nvd
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.

CVSS3: 5.5
debian
больше 5 лет назад

An issue was discovered in Xen through 4.14.x. There is a lack of pree ...

CVSS3: 5.5
github
больше 3 лет назад

An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.

suse-cvrf
больше 5 лет назад

Security update for xen

EPSS

Процентиль: 23%
0.00076
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3