Логотип exploitDog
bind:CVE-2020-29484
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-29484

Количество 15

Количество 15

ubuntu логотип

CVE-2020-29484

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2020-29484

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 409

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2020-29484

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When a Xenstore watch f ...

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-58pp-88x2-wf7f

больше 3 лет назад

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...

EPSS: Низкий
fstec логотип

BDU:2022-06298

около 5 лет назад

Уязвимость гипервизора Xen, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2331-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2313-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3916-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3915-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3881-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3945-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3914-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3913-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14578-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3880-1

около 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-29484

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...

CVSS3: 6
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-29484

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 409

CVSS3: 6
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-29484

An issue was discovered in Xen through 4.14.x. When a Xenstore watch f ...

CVSS3: 6
0%
Низкий
около 5 лет назад
github логотип
GHSA-58pp-88x2-wf7f

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06298

Уязвимость гипервизора Xen, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2331-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2313-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3916-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3915-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3881-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3945-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3914-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3913-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14578-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3880-1

Security update for xen

около 5 лет назад

Уязвимостей на страницу