Description
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4804-1 | xen security update |
EUVD |
EUVD-2020-20176 | An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:18:45.678Z
Reserved: 2020-10-22T00:00:00.000Z
Link: CVE-2020-27672
No data.
Status : Modified
Published: 2020-10-22T21:15:13.950
Modified: 2024-11-21T05:21:38.207
Link: CVE-2020-27672
OpenCVE Enrichment
No data.
Debian DSA
EUVD