Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29567

EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-29567

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xen 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xen是英国等都是英国剑桥(Cambridge)大学的产品。Xen是一款开源的虚拟机监视器产品。Service是一款用于Windows和Linux的计算机监控和教室管理软件。effect等都是的产品。effect是一款用于添加图像效果的软件包。 Xen through 4.14.x 版本存在安全漏洞,该漏洞源于当在cpu之间移动IRQ以分配IRQ处理的负载时,IRQ向量在相关的cpu上动态分配和解除分配。只有当某些限制条件得到满足时,才能解除分配。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-29567

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-29567

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-15 · 116 CVEs total

CVE-2020-284427.5 HIGHPrototype Pollution
CVE-2020-284567.3 HIGHCross-site Scripting (XSS)
CVE-2020-284577.2 HIGHCross-site Scripting (XSS)
CVE-2020-27055Google Android 安全漏洞
CVE-2020-29482Xen 代码问题漏洞
CVE-2020-29480Xen 授权问题漏洞
CVE-2020-29479Xen 权限许可和访问控制问题漏洞
CVE-2020-29571Xen 代码问题漏洞
CVE-2020-29570Xen 安全漏洞
CVE-2020-29569Linux kernel 资源管理错误漏洞
CVE-2020-27777Linux kernel 授权问题漏洞
CVE-2020-25712xorg-x11-server 缓冲区错误漏洞
CVE-2020-29568Xen 缓冲区错误漏洞
CVE-2020-29566Xen 处理逻辑错误漏洞
CVE-2020-27068Google Android 缓冲区错误漏洞
CVE-2020-27067Google Android 资源管理错误漏洞
CVE-2020-27066Google Android 资源管理错误漏洞
CVE-2020-27048Google Android 缓冲区错误漏洞
CVE-2020-27047Google Android 缓冲区错误漏洞
CVE-2020-27046Google Android 缓冲区错误漏洞

Showing top 20 of 116 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-29567

No comments yet


Leave a comment