Количество 15
Количество 15
CVE-2020-29484
An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...
CVE-2020-29484
An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 409
CVE-2020-29484
An issue was discovered in Xen through 4.14.x. When a Xenstore watch f ...
GHSA-58pp-88x2-wf7f
An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ...
BDU:2022-06298
Уязвимость гипервизора Xen, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2020:2331-1
Security update for xen
openSUSE-SU-2020:2313-1
Security update for xen
SUSE-SU-2020:3916-1
Security update for xen
SUSE-SU-2020:3915-1
Security update for xen
SUSE-SU-2020:3881-1
Security update for xen
SUSE-SU-2020:3945-1
Security update for xen
SUSE-SU-2020:3914-1
Security update for xen
SUSE-SU-2020:3913-1
Security update for xen
SUSE-SU-2020:14578-1
Security update for xen
SUSE-SU-2020:3880-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-29484 An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ... | CVSS3: 6 | 0% Низкий | около 5 лет назад | |
CVE-2020-29484 An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 409 | CVSS3: 6 | 0% Низкий | около 5 лет назад | |
CVE-2020-29484 An issue was discovered in Xen through 4.14.x. When a Xenstore watch f ... | CVSS3: 6 | 0% Низкий | около 5 лет назад | |
GHSA-58pp-88x2-wf7f An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the ... | 0% Низкий | больше 3 лет назад | ||
BDU:2022-06298 Уязвимость гипервизора Xen, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6 | 0% Низкий | около 5 лет назад | |
openSUSE-SU-2020:2331-1 Security update for xen | около 5 лет назад | |||
openSUSE-SU-2020:2313-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3916-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3915-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3881-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3945-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3914-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3913-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:14578-1 Security update for xen | около 5 лет назад | |||
SUSE-SU-2020:3880-1 Security update for xen | около 5 лет назад |
Уязвимостей на страницу