Логотип exploitDog
bind:CVE-2020-11739
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11739

Количество 12

Количество 12

ubuntu логотип

CVE-2020-11739

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2020-11739

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-11739

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able t

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2020-11739

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-5wwp-3576-jfjc

больше 3 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0599-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2234-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1124-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1634-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1139-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1138-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1630-1

больше 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-11739

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-11739

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.4
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-11739

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able t

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-11739

An issue was discovered in Xen through 4.13.x, allowing guest OS users ...

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-5wwp-3576-jfjc

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be abl...

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0599-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:2234-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1124-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1634-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1139-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1138-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1630-1

Security update for xen

больше 5 лет назад

Уязвимостей на страницу