An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
References
| Link | Resource |
|---|---|
| https://xenbits.xen.org/xsa/advisory-286.html | Patch Vendor Advisory |
| https://security.gentoo.org/glsa/202011-06 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3U4LNKKXU4UP4Z5XP6TMIWSML3QODPE/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZAM3LYJ5TZLSSNL3KXFILM46QKVTOUA/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/ | Mailing List Third Party Advisory |
| https://www.debian.org/security/2020/dsa-4804 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2021/01/19/5 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-10-22 21:15
Updated : 2022-04-26 16:29
NVD link : CVE-2020-27674
Mitre link : CVE-2020-27674
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
xen
- xen
CWE
CWE-787
Out-of-bounds Write
