mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
165 lines
6.6 KiB
JSON
165 lines
6.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@xen.org",
|
|
"ID": "CVE-2021-28692",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "4.13.x"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "4.14.x"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "4.15.x"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "xen-unstable"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "4.12.x"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "xen",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "4.11.x"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Xen"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"configuration": {
|
|
"configuration_data": {
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "All Xen versions from at least 3.2 onwards are vulnerable. Earlier\nversions have not been inspected.\n\nOnly x86 systems with in-use IOMMU hardware are vulnerable. x86 systems\nwithout any IOMMUs in use are not vulnerable. On Arm systems IOMMU /\nSMMU use is not security supported.\n\nOnly x86 guests which have physical devices passed through to them can\nleverage the vulnerability."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"credit": {
|
|
"credit_data": {
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "This issue was discovered by Igor Druzhinin and Andrew Cooper of Citrix,\nand further issues were uncovered by by Jan Beulich of SUSE while trying\nto fix the first issue."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"impact_data": {
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A malicious guest may be able to elevate its privileges to that of the\nhost, cause host or guest Denial of Service (DoS), or cause information\nleaks."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "unknown"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://xenbits.xenproject.org/xsa/advisory-373.txt",
|
|
"refsource": "MISC",
|
|
"name": "https://xenbits.xenproject.org/xsa/advisory-373.txt"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-202107-30",
|
|
"url": "https://security.gentoo.org/glsa/202107-30"
|
|
}
|
|
]
|
|
},
|
|
"workaround": {
|
|
"workaround_data": {
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Not passing through physical devices to untrusted guests will avoid\nthe vulnerability."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
}
|
|
} |