Description
Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2940-1 | linux security update |
Debian DLA |
DLA-2941-1 | linux-4.19 security update |
Debian DSA |
DSA-5050-1 | linux security update |
Debian DSA |
DSA-5096-1 | linux security update |
EUVD |
EUVD-2021-15369 | Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713 |
Ubuntu USN |
USN-5298-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5337-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5338-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5368-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5377-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6001-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6013-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6014-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2024-08-03T21:55:11.592Z
Reserved: 2021-03-18T00:00:00.000Z
Link: CVE-2021-28712
No data.
Status : Modified
Published: 2022-01-05T17:15:09.070
Modified: 2024-11-21T06:00:11.787
Link: CVE-2021-28712
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN