{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "url": "https://xenbits.xen.org/xsa/advisory-286.html", "refsource": "MISC", "name": "https://xenbits.xen.org/xsa/advisory-286.html" }, { "refsource": "GENTOO", "name": "GLSA-202011-06", "url": "https://security.gentoo.org/glsa/202011-06" }, { "refsource": "FEDORA", "name": "FEDORA-2020-5398bfb466", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3U4LNKKXU4UP4Z5XP6TMIWSML3QODPE/" }, { "refsource": "FEDORA", "name": "FEDORA-2020-ec84c1565b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZAM3LYJ5TZLSSNL3KXFILM46QKVTOUA/" }, { "refsource": "FEDORA", "name": "FEDORA-2020-6dd36a716c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/" }, { "refsource": "DEBIAN", "name": "DSA-4804", "url": "https://www.debian.org/security/2020/dsa-4804" }, { "refsource": "MLIST", "name": "[oss-security] 20210119 Xen Security Advisory 286 v6 (CVE-2020-27674) - x86 PV guest INVLPG-like flushes may leave stale TLB entries", "url": "http://www.openwall.com/lists/oss-security/2021/01/19/5" } ] } }