4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
12.6%
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen
through 4.14.x. drivers/xen/events/events_base.c allows event-channel
removal during the event-handling loop (a race condition). This can cause a
use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash
via events for an in-reconfiguration paravirtualized device, aka
CID-073d0552ead5.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux-riscv-5.8 | < 5.8.0-17.19~20.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1011.14 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < 5.4.0-59.65~18.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-kvm | < 4.15.0-1082.84 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-kvm | < 4.4.0-1085.94 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < 5.4.0-1031.32 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-kvm | < 5.8.0-1019.21 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-198.230~14.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1091.96 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1034.35 | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27675
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073d0552ead5bfc7a3a9c01de590e924f11b5dd2
github.com/torvalds/linux/commit/073d0552ead5bfc7a3a9c01de590e924f11b5dd2
launchpad.net/bugs/cve/CVE-2020-27675
nvd.nist.gov/vuln/detail/CVE-2020-27675
security-tracker.debian.org/tracker/CVE-2020-27675
ubuntu.com/security/notices/USN-4679-1
ubuntu.com/security/notices/USN-4680-1
ubuntu.com/security/notices/USN-4681-1
ubuntu.com/security/notices/USN-4751-1
xenbits.xen.org/xsa/advisory-331.html
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
12.6%