Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 750779 (CVE-2020-27670, CVE-2020-27671, CVE-2020-27672, CVE-2020-27673, CVE-2020-27674, CVE-2020-27675) - <app-emulation/xen-4.13.1-r5: Multiple vulnerabilities (CVE-2020-{27670,27671,27672,27673,C27674,27675})
Summary: <app-emulation/xen-4.13.1-r5: Multiple vulnerabilities (CVE-2020-{27670,27671...
Status: RESOLVED FIXED
Alias: CVE-2020-27670, CVE-2020-27671, CVE-2020-27672, CVE-2020-27673, CVE-2020-27674, CVE-2020-27675
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B1 [glsa+ cve]
Keywords: CC-ARCHES
Depends on:
Blocks:
 
Reported: 2020-10-23 04:16 UTC by Sam James
Modified: 2020-11-11 03:52 UTC (History)
3 users (show)

See Also:
Package list:
app-emulation/xen-4.13.1-r5
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-10-23 04:16:33 UTC
* CVE-2020-27670

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated. 

* CVE-2020-27671

An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled. 

* CVE-2020-27672

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages. 

* CVE-2020-27673

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271. 

* CVE-2020-27674

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique. 

* CVE-2020-27675

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.
Comment 1 NATTkA bot gentoo-dev 2020-10-27 12:40:49 UTC
Unable to check for sanity:

> no match for package: app-emulation/xen/xen-4.13.1-r5
Comment 2 NATTkA bot gentoo-dev 2020-10-27 15:20:54 UTC
All sanity-check issues have been resolved
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-11-01 02:20:14 UTC
amd64 done

all arches done
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-11-01 10:55:25 UTC
Please cleanup, thanks!
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2020-11-11 03:49:52 UTC
This issue was resolved and addressed in
 GLSA 202011-06 at https://security.gentoo.org/glsa/202011-06
by GLSA coordinator Sam James (sam_c).