Логотип exploitDog
bind:"CVE-2020-28374" OR bind:"CVE-2020-27673" OR bind:"CVE-2020-29569" OR bind:"CVE-2020-29568"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-28374" OR bind:"CVE-2020-27673" OR bind:"CVE-2020-29569" OR bind:"CVE-2020-29568"

Количество 99

Количество 99

suse-cvrf логотип

SUSE-SU-2021:0853-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0835-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0818-1

больше 4 лет назад

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP1)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9307

около 4 лет назад

ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9306

около 4 лет назад

ELSA-2021-9306: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0241-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-hj67-hpcv-3wx5

около 3 лет назад

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2020-05279

больше 4 лет назад

Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0532-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0353-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0354-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1093

около 4 лет назад

ELSA-2021-1093: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-0856

больше 4 лет назад

ELSA-2021-0856: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2020-29568

больше 4 лет назад

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2020-29568

больше 4 лет назад

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-29568

больше 4 лет назад

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linu ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2020-29569

больше 4 лет назад

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2020-29569

больше 4 лет назад

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2020-29569

больше 4 лет назад

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-29569

больше 4 лет назад

An issue was discovered in the Linux kernel through 5.10.1, as used wi ...

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2021:0853-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP1)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0835-1

Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0818-1

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP1)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-9307

ELSA-2021-9307: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9306

ELSA-2021-9306: Unbreakable Enterprise kernel security update (IMPORTANT)

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0241-1

Security update for the Linux Kernel

больше 4 лет назад
github логотип
GHSA-hj67-hpcv-3wx5

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-05279

Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0532-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0353-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0354-1

Security update for the Linux Kernel

больше 4 лет назад
oracle-oval логотип
ELSA-2021-1093

ELSA-2021-1093: kernel security, bug fix, and enhancement update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-0856

ELSA-2021-0856: kernel security and bug fix update (IMPORTANT)

больше 4 лет назад
ubuntu логотип
CVE-2020-29568

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-29568

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-29568

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linu ...

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-29569

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

CVSS3: 8.8
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-29569

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

CVSS3: 8.8
0%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 8.8
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-29569

An issue was discovered in the Linux kernel through 5.10.1, as used wi ...

CVSS3: 8.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу