CVE-2020-27673

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/01/19/6 Mailing List Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202011-06 Third Party Advisory
https://xenbits.xen.org/xsa/advisory-332.html Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/01/19/6 Mailing List Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070 Patch Vendor Advisory
https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202011-06 Third Party Advisory
https://xenbits.xen.org/xsa/advisory-332.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2021/01/19/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/01/19/6 - Mailing List, Third Party Advisory
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070 - Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070 - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202011-06 - Third Party Advisory () https://security.gentoo.org/glsa/202011-06 - Third Party Advisory
References () https://xenbits.xen.org/xsa/advisory-332.html - Patch, Third Party Advisory () https://xenbits.xen.org/xsa/advisory-332.html - Patch, Third Party Advisory

22 Aug 2023, 15:16

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*

Information

Published : 2020-10-22 21:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27673

Mitre link : CVE-2020-27673

CVE.ORG link : CVE-2020-27673


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap

xen

  • xen

linux

  • linux_kernel