[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-28701Date: (C)2021-09-09   (M)2024-02-09


Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score : 4.4
Exploit Score: 1.1Exploit Score: 3.4
Impact Score: 6.0Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-4977
FEDORA-2021-11577e5229
FEDORA-2021-5a0c7bc619
FEDORA-2021-fed53cbc7d
GLSA-202208-23
http://www.openwall.com/lists/oss-security/2021/09/08/2
http://xenbits.xen.org/xsa/advisory-384.html
https://xenbits.xenproject.org/xsa/advisory-384.txt

CWE    1
CWE-362
OVAL    12
oval:org.secpod.oval:def:89045684
oval:org.secpod.oval:def:89045680
oval:org.secpod.oval:def:86598
oval:org.secpod.oval:def:120749
...

© SecPod Technologies