Логотип exploitDog
bind:CVE-2020-29566
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-29566

Количество 15

Количество 15

ubuntu логотип

CVE-2020-29566

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2020-29566

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-29566

около 5 лет назад

An issue was discovered in Xen through 4.14.x. When they require assis ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-mr64-xwwr-mx4c

больше 3 лет назад

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

EPSS: Низкий
fstec логотип

BDU:2021-03169

около 5 лет назад

Уязвимость гипервизора Xen, вызванная неконтролируемой рекурсией, позволяющая нарушителю вызвать аварийное завершение работы приложения

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2331-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2313-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3916-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3915-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3881-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3945-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3914-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3913-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14578-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3880-1

около 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-29566

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-29566

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-29566

An issue was discovered in Xen through 4.14.x. When they require assis ...

CVSS3: 5.5
0%
Низкий
около 5 лет назад
github логотип
GHSA-mr64-xwwr-mx4c

An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03169

Уязвимость гипервизора Xen, вызванная неконтролируемой рекурсией, позволяющая нарушителю вызвать аварийное завершение работы приложения

CVSS3: 5.5
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2331-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2313-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3916-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3915-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3881-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3945-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3914-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3913-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14578-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3880-1

Security update for xen

около 5 лет назад

Уязвимостей на страницу