Vulnerability Details : CVE-2020-15852
An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
Products affected by CVE-2020-15852
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
- cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
- cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15852
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15852
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-15852
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-15852
-
https://security.netapp.com/advisory/ntap-20200810-0001/
CVE-2020-15852 Linux Kernel Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://xenbits.xen.org/xsa/advisory-329.html
XSA-329 - Xen Security AdvisoriesPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/07/21/2
oss-security - Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm bitmap context switching issuesMailing List;Third Party Advisory
-
https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2
x86/ioperm: Fix io bitmap invalidation on Xen PV · torvalds/linux@cadfad8 · GitHubPatch;Third Party Advisory
-
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cadfad870154e14f745ec845708bc17d166065f2
kernel/git/torvalds/linux.git - Linux kernel source treeMailing List;Patch;Vendor Advisory
Jump to