Vulnerability Name: | CVE-2021-28039 (CCN-197734) |
Assigned: | 2021-02-16 |
Published: | 2021-02-16 |
Updated: | 2022-07-12 |
Summary: | An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFIG_XEN_UNPOPULATED_ALLOC but not CONFIG_XEN_BALLOON_MEMORY_HOTPLUG.
|
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-131
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2021-28039
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages
Source: CCN Type: Xen Security Advisory XSA-369 Linux: special config may crash when trying to map foreign pages
Source: MISC Type: Patch, Vendor Advisory http://xenbits.xen.org/xsa/advisory-369.html
Source: XF Type: UNKNOWN xen-special-config-dos(197734)
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210409-0001/
|
Vulnerable Configuration: | Configuration 1: cpe:/o:xen:xen:-:*:*:*:*:*:*:*AND cpe:/o:linux:linux_kernel:*:*:*:*:*:*:x86:* (Version >= 5.9.0 and <= 5.11.3) Configuration 2: cpe:/a:netapp:cloud_backup:-:*:*:*:*:*:*:*OR cpe:/o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:xensource:xen:4.0:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.1.1:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.1.2:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.1:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.4:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.5:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.6:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.7:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.8:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.9:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.10:*:*:*:*:*:*:*OR cpe:/a:xensource:xen:4.13.1:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |