An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://xenbits.xen.org/xsa/advisory-286.html | patch vendor advisory |
https://security.gentoo.org/glsa/202011-06 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3U4LNKKXU4UP4Z5XP6TMIWSML3QODPE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZAM3LYJ5TZLSSNL3KXFILM46QKVTOUA/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4804 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2021/01/19/5 | third party advisory mailing list |