Логотип exploitDog
bind:"CVE-2020-29571"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-29571"

Количество 15

Количество 15

ubuntu логотип

CVE-2020-29571

около 5 лет назад

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2020-29571

около 5 лет назад

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2020-29571

около 5 лет назад

An issue was discovered in Xen through 4.14.x. A bounds check common t ...

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-26rg-mq58-rxvm

больше 3 лет назад

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

EPSS: Низкий
fstec логотип

BDU:2021-03186

около 5 лет назад

Уязвимость гипервизора Xen, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.2
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2331-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2313-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3916-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3915-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3881-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3945-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3914-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3913-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14578-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3880-1

около 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-29571

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

CVSS3: 6.2
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-29571

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

CVSS3: 6.2
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-29571

An issue was discovered in Xen through 4.14.x. A bounds check common t ...

CVSS3: 6.2
0%
Низкий
около 5 лет назад
github логотип
GHSA-26rg-mq58-rxvm

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03186

Уязвимость гипервизора Xen, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.2
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2331-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2313-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3916-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3915-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3881-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3945-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3914-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3913-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14578-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3880-1

Security update for xen

около 5 лет назад

Уязвимостей на страницу