Vulnerability Name:

CVE-2020-29567 (CCN-193123)

Assigned:2020-12-15
Published:2020-12-15
Updated:2021-12-10
Summary:An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
CVSS v3 Severity:6.2 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-770
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-29567

Source: XF
Type: UNKNOWN
xen-cve202029567-dos(193123)

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-64859a826b

Source: GENTOO
Type: Third Party Advisory
GLSA-202107-30

Source: CCN
Type: Xen Security Advisory XSA-356
Infinite loop when cleaning up IRQ vectors

Source: MISC
Type: Patch, Vendor Advisory
https://xenbits.xenproject.org/xsa/advisory-356.html

Vulnerable Configuration:Configuration 1:
  • cpe:/o:xen:xen:*:*:*:*:*:*:x86:* (Version <= 4.14.0)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:xensource:xen:4.14:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7831
    P
    xen-libs-4.17.0_06-150500.1.10 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:635
    P
    Security update for rubygem-activesupport-5_1 (Moderate) (in QA)
    2022-09-29
    oval:org.opensuse.security:def:3225
    P
    libopus0-1.1-3.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3535
    P
    java-1_8_0-openjdk-1.8.0.222-27.35.2 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95165
    P
    xen-4.16.0_08-150400.2.12 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94855
    P
    xen-libs-4.16.0_08-150400.2.12 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:336
    P
    xen-libs-4.14.1_16-1.6 on GA media (Moderate)
    2022-06-13
    oval:org.opensuse.security:def:388
    P
    xen-libs-4.16.0_08-150400.2.12 on GA media (Moderate)
    2022-06-10
    oval:org.opensuse.security:def:113591
    P
    xen-4.15.1_01-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106977
    P
    xen-4.15.1_01-1.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:1265
    P
    Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP3) (Important)
    2021-09-16
    oval:org.opensuse.security:def:101411
    P
    xen-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:63385
    P
    xen-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:2296
    P
    xen-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:101112
    P
    xen-libs-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:72095
    P
    xen-libs-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:62354
    P
    xen-libs-4.14.1_16-1.6 on GA media (Moderate)
    2021-08-09
    BACK
    xen xen *
    fedoraproject fedora 33
    xensource xen 4.14