First published: Thu Oct 22 2020(Updated: )
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=5.9.1 | |
Fedora | =31 | |
Fedora | =32 | |
Fedora | =33 | |
Debian | =9.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27675 has a severe impact due to the potential for a use-after-free or NULL pointer dereference leading to system crashes.
To remediate CVE-2020-27675, upgrade your Linux kernel to version 5.10.223-1 or later, or applicable patched versions.
CVE-2020-27675 affects Linux kernels up to version 5.9.1 and certain Fedora and Debian releases.
CVE-2020-27675 can lead to race conditions, causing unexpected behavior like crashes during event-handling in virtualization.
Yes, CVE-2020-27675 specifically affects the Linux kernel's handling of event channels in Xen virtualization.