summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Mühlenhoff <jmm@debian.org>2020-10-21 12:58:06 +0200
committerMoritz Mühlenhoff <jmm@debian.org>2020-10-21 12:58:06 +0200
commitc3b589d2efb7379f00bfd5d741bdae4bc38f0b07 (patch)
tree64a95769502074767a5f192f7f1930d121608a0f
parentfbeef21b85ef0bab9d994cf809ef4536dcd91bc5 (diff)
new xen/linux issues
-rw-r--r--data/CVE/list.202018
1 files changed, 18 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020
index eeea5d865f..86e23dcfbb 100644
--- a/data/CVE/list.2020
+++ b/data/CVE/list.2020
@@ -1,3 +1,21 @@
+CVE-2020-XXXX [Rogue guests can cause DoS of Dom0 via high frequency events]
+ - linux <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-332.html
+CVE-2020-XXXX [Race condition in Linux event handler may crash dom0]
+ - linux <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-331.html
+CVE-2020-XXXX [Xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries]
+ - xen <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-286.html
+CVE-2020-XXXX [Xen: x86: Race condition in Xen mapping code]
+ - xen <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-345.html
+CVE-2020-XXXX [Xen: undue deferral of IOMMU TLB flushes]
+ - xen <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-346.html
+CVE-2020-XXXX [Xen: unsafe AMD IOMMU page table updates]
+ - xen <unfixed>
+ NOTE: https://xenbits.xen.org/xsa/advisory-347.html
CVE-2020-27600
RESERVED
CVE-2020-27599

© 2014-2024 Faster IT GmbH | imprint | privacy policy