Количество 15
Количество 15
GHSA-h88c-j84g-842h
An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...
CVE-2020-29480
An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...
CVE-2020-29480
An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. T
CVE-2020-29480
An issue was discovered in Xen through 4.14.x. Neither xenstore implem ...
BDU:2022-06299
Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
openSUSE-SU-2020:2331-1
Security update for xen
openSUSE-SU-2020:2313-1
Security update for xen
SUSE-SU-2020:3916-1
Security update for xen
SUSE-SU-2020:3915-1
Security update for xen
SUSE-SU-2020:3881-1
Security update for xen
SUSE-SU-2020:3945-1
Security update for xen
SUSE-SU-2020:3914-1
Security update for xen
SUSE-SU-2020:3913-1
Security update for xen
SUSE-SU-2020:14578-1
Security update for xen
SUSE-SU-2020:3880-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-h88c-j84g-842h An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests... | 0% Низкий | больше 3 лет назад | ||
CVE-2020-29480 An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests... | CVSS3: 2.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-29480 An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. T | CVSS3: 2.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-29480 An issue was discovered in Xen through 4.14.x. Neither xenstore implem ... | CVSS3: 2.3 | 0% Низкий | около 5 лет назад | |
BDU:2022-06299 Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 2.3 | 0% Низкий | около 5 лет назад | |
openSUSE-SU-2020:2331-1 Security update for xen | около 5 лет назад | |||
openSUSE-SU-2020:2313-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3916-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3915-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3881-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3945-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3914-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3913-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:14578-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3880-1 Security update for xen | около 5 лет назад |
Уязвимостей на страницу