First published: Tue Jul 07 2020(Updated: )
An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be mapped into Xen address space so it can be directly accessed. On Arm, the region is accessed with instructions that require a specific alignment. Unfortunately, there is no check that the address provided by the guest will be correctly aligned. As a result, a malicious guest could cause a hypervisor crash by passing a misaligned address. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). All Xen versions are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | >=4.8.0<=4.13.1 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.3+36-g54dacb5c02-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15564 is a vulnerability in Xen that allows Arm guest OS users to cause a hypervisor crash due to a missing alignment check in VCPUOP_register_vcpu_info.
CVE-2020-15564 affects Xen versions up to 4.13.x.
The impact of CVE-2020-15564 is that Arm guest OS users can cause a hypervisor crash.
The vulnerability CVE-2020-15564 can be fixed by updating Xen to version 4.11.3+24- or higher.
You can find more information about CVE-2020-15564 on the Xen advisory page (http://xenbits.xen.org/xsa/advisory-327.html) and the Debian security advisory page (https://www.debian.org/security/2020/dsa-4723).