An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
References
Link | Resource |
---|---|
https://xenbits.xen.org/xsa/advisory-286.html | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202011-06 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3U4LNKKXU4UP4Z5XP6TMIWSML3QODPE/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZAM3LYJ5TZLSSNL3KXFILM46QKVTOUA/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2020/dsa-4804 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/01/19/5 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-10-22 14:15
Updated : 2022-04-26 09:29
NVD link : CVE-2020-27674
Mitre link : CVE-2020-27674
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
xen
- xen
fedoraproject
- fedora