CWE
119
Advisory Published
Updated

CVE-2020-15564: Buffer Overflow

First published: Tue Jul 07 2020(Updated: )

An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be mapped into Xen address space so it can be directly accessed. On Arm, the region is accessed with instructions that require a specific alignment. Unfortunately, there is no check that the address provided by the guest will be correctly aligned. As a result, a malicious guest could cause a hypervisor crash by passing a misaligned address. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). All Xen versions are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Xen Xen>=4.8.0<=4.13.1
Debian Debian Linux=10.0
Fedoraproject Fedora=31
Fedoraproject Fedora=32
debian/xen
4.14.6-1
4.14.5+94-ge49571868d-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+36-g54dacb5c02-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-15564?

    CVE-2020-15564 is a vulnerability in Xen that allows Arm guest OS users to cause a hypervisor crash due to a missing alignment check in VCPUOP_register_vcpu_info.

  • How does CVE-2020-15564 affect Xen?

    CVE-2020-15564 affects Xen versions up to 4.13.x.

  • What is the impact of CVE-2020-15564?

    The impact of CVE-2020-15564 is that Arm guest OS users can cause a hypervisor crash.

  • How can the vulnerability CVE-2020-15564 be fixed?

    The vulnerability CVE-2020-15564 can be fixed by updating Xen to version 4.11.3+24- or higher.

  • Where can I find more information about CVE-2020-15564?

    You can find more information about CVE-2020-15564 on the Xen advisory page (http://xenbits.xen.org/xsa/advisory-327.html) and the Debian security advisory page (https://www.debian.org/security/2020/dsa-4723).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203