CVE-2020-29568
- EPSS 0.1%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue i...
CVE-2020-29569
- EPSS 0.07%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to ru...
CVE-2020-29570
- EPSS 0.06%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also re...
CVE-2020-29571
- EPSS 0.06%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consum...
CVE-2020-29040
- EPSS 0.07%
- Veröffentlicht 24.11.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 05:23:34
An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect f...
CVE-2020-28368
- EPSS 0.07%
- Veröffentlicht 10.11.2020 19:15:11
- Zuletzt bearbeitet 21.11.2024 05:22:40
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically i...
CVE-2020-27673
- EPSS 0.06%
- Veröffentlicht 22.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:21:38
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
CVE-2020-27674
- EPSS 0.07%
- Veröffentlicht 22.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:21:38
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
CVE-2020-27670
- EPSS 0.04%
- Veröffentlicht 22.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:21:37
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
CVE-2020-27671
- EPSS 0.07%
- Veröffentlicht 22.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:21:38
An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.