Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29569

EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-29569

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel through 5.10.1 与 Xen 4.14.x 一起使用时存在资源管理错误漏洞,该漏洞源于Linux内核PV块后端期望内核线程处理程序在停止时将ring->xenblkd重置为NULL。但是,如果前端在连接和断开状态之间快速切换,处理程序可能没有时间运行。因此,块后端可能会在释放指针后重用指针。行为不端的客户机可以通过持续连接、断开块前端的连接来触发dom0崩溃。不能排除特权升级和信息泄
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-29569

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-29569

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-15 · 116 CVEs total

CVE-2020-284427.5 HIGHPrototype Pollution
CVE-2020-284567.3 HIGHCross-site Scripting (XSS)
CVE-2020-284577.2 HIGHCross-site Scripting (XSS)
CVE-2020-27055Google Android 安全漏洞
CVE-2020-29482Xen 代码问题漏洞
CVE-2020-29480Xen 授权问题漏洞
CVE-2020-29479Xen 权限许可和访问控制问题漏洞
CVE-2020-29571Xen 代码问题漏洞
CVE-2020-29570Xen 安全漏洞
CVE-2020-27777Linux kernel 授权问题漏洞
CVE-2020-25712xorg-x11-server 缓冲区错误漏洞
CVE-2020-29568Xen 缓冲区错误漏洞
CVE-2020-29567Xen 安全漏洞
CVE-2020-29566Xen 处理逻辑错误漏洞
CVE-2020-27068Google Android 缓冲区错误漏洞
CVE-2020-27067Google Android 资源管理错误漏洞
CVE-2020-27066Google Android 资源管理错误漏洞
CVE-2020-27048Google Android 缓冲区错误漏洞
CVE-2020-27047Google Android 缓冲区错误漏洞
CVE-2020-27046Google Android 缓冲区错误漏洞

Showing top 20 of 116 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-29569

No comments yet


Leave a comment