CVE-2020-27673
Published at:
-
22-10-2020 11:15
Last modified:
-
26-04-2022 06:23
Total changes:
-
5
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
High
Availability
None
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
5.5
Base score
1.8
3.6
Exploitability score
Impact score
Verification logic
Reference
- https://xenbits.xen.org/xsa/advisory-332.html
- https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070
- openSUSE-SU-2020:1783-Mailing List, Third Party Advisory
- openSUSE-SU-2020:1844-Mailing List, Third Party Advisory
- GLSA-202011-06-Third Party Advisory
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update-Mailing List, Third Party Advisory
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update-Mailing List, Third Party Advisory
- [oss-security] 20210119 Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events-Mailing List, Third Party Advisory
Keywords