Hide Forgot
An issue was discovered in all Xen versions from 4.2 onwards, allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1891093]
Acknowledgments: Name: the Xen project
External References: https://xenbits.xen.org/xsa/advisory-346.html
Upstream fix: https://xenbits.xen.org/xsa/xsa346/xsa346-1.patch https://xenbits.xen.org/xsa/xsa346/xsa346-2.patch
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27671
Statement: All Xen versions from 4.2 onwards are vulnerable. Red Hat Enterprise Linux 5 is not affected by this flaw, as it shipped with an older version of Xen.
Mitigation: Avoid passing through physical devices to untrusted guests. Refer to the XSA-346 advisory for additional information.