Vulnerabilities > CVE-2020-27672 - Use After Free vulnerability in multiple products
Attack vector
LOCAL Attack complexity
HIGH Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://xenbits.xen.org/xsa/advisory-345.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
- https://security.gentoo.org/glsa/202011-06
- https://www.debian.org/security/2020/dsa-4804
- http://www.openwall.com/lists/oss-security/2021/01/19/7
- http://xenbits.xen.org/xsa/advisory-345.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/