CVE-2020-25603

Source
https://cve.org/CVERecord?id=CVE-2020-25603
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25603.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-25603
Downstream
Related
Published
2020-09-23T22:15:13.853Z
Modified
2026-02-24T01:20:12.072119Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.

References

Affected packages

Git / github.com/htmlunit/htmlunit

Affected ranges

Type
GIT
Repo
https://github.com/htmlunit/htmlunit
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*
2.32
2.33
2.34.0
2.34.1
2.35.0
2.36.0
2.37.0
2.38.0
2.39.0
2.40.0
2.41.0
2.42.0
2.43.0
2.44.0
2.45.0
2.46.0
2.47.0
2.47.1
2.48.0
2.49.0
2.49.1
2.50.0
2.51.0
2.52.0
2.53.0
2.54.0
2.55.0
2.56.0
2.57.0
2.58.0
2.59.0
2.60.0
2.61.0
2.62.0
2.63.0
2.64.0
2.65.0
2.65.1
2.66.0
2.67.0
2.68.0
2.69.0
2.70.0
3.*
3.0.0
3.1.0
3.10.0
3.11.0
3.2.0
3.3.0
3.4.0
3.5.0
3.6.0
3.7.0
3.8.0
3.9.0
4.*
4.0.0
4.1.0
4.10.0
4.11.0
4.11.1
4.12.0
4.13.0
4.14.0
4.2.0
4.3.0
4.4.0
4.5.0
4.6.0
4.7.0
4.8.0
4.9.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25603.json"