CVE-2020-29483
- EPSS 0.06%
- Veröffentlicht 15.12.2020 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:24:05
An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by ...
- EPSS 0.06%
- Veröffentlicht 15.12.2020 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:24:05
An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that wa...
CVE-2020-29485
- EPSS 0.06%
- Veröffentlicht 15.12.2020 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:24:05
An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems usin...
- EPSS 0.06%
- Veröffentlicht 15.12.2020 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:24:05
An issue was discovered in Xen through 4.14.x. Nodes in xenstore have an ownership. In oxenstored, a owner could give a node away. However, node ownership has quota implications. Any guest can run another guest out of quota, or create an unbounded nu...
CVE-2020-29479
- EPSS 0.05%
- Veröffentlicht 15.12.2020 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:04
An issue was discovered in Xen through 4.14.x. In the Ocaml xenstored implementation, the internal representation of the tree has special cases for the root node, because this node has no parent. Unfortunately, permissions were not checked for certai...
CVE-2020-29566
- EPSS 0.07%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:12
An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that th...
CVE-2020-29567
- EPSS 0.06%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If...
CVE-2020-29568
- EPSS 0.06%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue i...
CVE-2020-29569
- EPSS 0.07%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to ru...
CVE-2020-29570
- EPSS 0.06%
- Veröffentlicht 15.12.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 05:24:13
An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also re...