Vulnerability Details : CVE-2020-27673
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
Vulnerability category: Denial of service
Products affected by CVE-2020-27673
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-27673
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-27673
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
References for CVE-2020-27673
-
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
[SECURITY] [DLA 2494-1] linux security updateMailing List;Third Party Advisory
-
https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070
xen/events: defer eoi in case of excessive number of events · torvalds/linux@e99502f · GitHubPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/01/19/6
oss-security - Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency eventsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
[SECURITY] [DLA 2483-1] linux-4.19 security updateMailing List;Third Party Advisory
-
https://xenbits.xen.org/xsa/advisory-332.html
XSA-332 - Xen Security AdvisoriesPatch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
[security-announce] openSUSE-SU-2020:1844-1: important: Security updateMailing List;Third Party Advisory
-
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://security.gentoo.org/glsa/202011-06
Xen: Multiple vulnerabilities (GLSA 202011-06) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
[security-announce] openSUSE-SU-2020:1783-1: important: Security updateMailing List;Third Party Advisory
Jump to