Логотип exploitDog
bind:CVE-2020-29481
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-29481

Количество 15

Количество 15

ubuntu логотип

CVE-2020-29481

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2020-29481

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-29481

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Access rights of Xensto ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-vcqm-hqq4-5mxm

больше 3 лет назад

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

EPSS: Низкий
fstec логотип

BDU:2022-06183

около 5 лет назад

Уязвимость гипервизора Xen, связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2331-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2313-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3916-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3915-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3881-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3945-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3914-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3913-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14578-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3880-1

около 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-29481

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

CVSS3: 8.8
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-29481

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

CVSS3: 8.8
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-29481

An issue was discovered in Xen through 4.14.x. Access rights of Xensto ...

CVSS3: 8.8
0%
Низкий
около 5 лет назад
github логотип
GHSA-vcqm-hqq4-5mxm

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06183

Уязвимость гипервизора Xen, связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2331-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2313-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3916-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3915-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3881-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3945-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3914-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3913-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14578-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3880-1

Security update for xen

около 5 лет назад

Уязвимостей на страницу