First published: Thu Oct 22 2020(Updated: )
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=3.2.0<=4.14.0 | |
Fedora | =31 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-27672.
The severity of CVE-2020-27672 is high.
The affected software includes Xen, Debian Linux, Fedoraproject Fedora, and openSUSE Leap.
x86 guest OS users can exploit CVE-2020-27672 by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Yes, there are remedies available for CVE-2020-27672. Please refer to the advisory links provided for more information.