Логотип exploitDog
bind:CVE-2020-11742
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11742

Количество 14

Количество 14

ubuntu логотип

CVE-2020-11742

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2020-11742

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2020-11742

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-11742

почти 6 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-q23v-6m98-94w9

больше 3 лет назад

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0599-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2234-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1124-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1634-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1139-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1138-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14448-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1630-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14444-1

больше 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-11742

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.5
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-11742

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.9
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-11742

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

CVSS3: 5.5
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-11742

An issue was discovered in Xen through 4.13.x, allowing guest OS users ...

CVSS3: 5.5
0%
Низкий
почти 6 лет назад
github логотип
GHSA-q23v-6m98-94w9

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0599-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:2234-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1124-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1634-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1139-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1138-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:14448-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1630-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14444-1

Security update for xen

больше 5 лет назад

Уязвимостей на страницу