CVE-2020-27672

Severity
7.0HIGH
EPSS
0.0%
top 88.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22
Latest updateMay 24

Description

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages3 packages

Debianxen< 4.14.0+80-gd101b417b7-1+3
NVDxen/xen3.2.04.14.0
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 10.0, Fedora 31

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7627-2wxq-jrmh: An issue was discovered in Xen through 42022-05-24
OSV
CVE-2020-27672: An issue was discovered in Xen through 42020-10-22
CVEList
CVE-2020-27672: An issue was discovered in Xen through 42020-10-22

📋Vendor Advisories

2
Red Hat
xen: x86: race condition in Xen mapping code (XSA-345)2020-10-20
Debian
CVE-2020-27672: xen - An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cau...2020

💬Community

2
Bugzilla
CVE-2020-27672 xen: x86: race condition in Xen mapping code (XSA-345)2020-10-23
Bugzilla
CVE-2020-27672 xen: x86: race condition in Xen mapping code (XSA-345) [fedora-all]2020-10-23