CVE-2020-27672

Name
CVE-2020-27672
Description
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://xenbits.xen.org/xsa/advisory-345.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
GENTOO https://security.gentoo.org/glsa/202011-06
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/
DEBIAN https://www.debian.org/security/2020/dsa-4804
MLIST http://www.openwall.com/lists/oss-security/2021/01/19/7
CONFIRM http://xenbits.xen.org/xsa/advisory-345.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* xen >= 3.2.0 <= 4.14.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen 3.10-main 4.12.4-r0 None fixed
xen 3.11-main 4.13.4-r2 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.12-main 4.13.4-r3 Natanael Copa <ncopa@alpinelinux.org> fixed