First published: Thu Oct 22 2020(Updated: )
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen XAPI | <=4.14.0 | |
Fedora | =31 | |
Fedora | =32 | |
Fedora | =33 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27674 is classified as a high severity vulnerability due to its potential impact on guest OS privilege escalation.
Mitigation for CVE-2020-27674 involves upgrading to a patched version of Xen that addresses this vulnerability.
CVE-2020-27674 affects Xen versions up to and including 4.14.x.
CVE-2020-27674 affects x86 PV guest operating systems running on vulnerable Xen hypervisors.
CVE-2020-27674 can be exploited through an INVLPG-like attack technique that modifies kernel memory contents.