SB2020102221 - Buffer overflow in Xen
Published: October 22, 2020 Updated: January 24, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2020-27674)
The vulnerability allows a local authenticated user to read and manipulate data.
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2021/01/19/5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZAM3LYJ5TZLSSNL3KXFILM46QKVTOUA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3U4LNKKXU4UP4Z5XP6TMIWSML3QODPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/
- https://security.gentoo.org/glsa/202011-06
- https://www.debian.org/security/2020/dsa-4804
- https://xenbits.xen.org/xsa/advisory-286.html