Memory Update Flaws in Xen Hypervisor Affecting x86 Platforms
CVE-2021-28705
7.8HIGH
What is CVE-2021-28705?
The vulnerability involves insufficient error handling during partially successful page memory-type (P2M) updates in x86 HVM and PVH guests using the Xen Hypervisor. When operating in populate-on-demand (PoD) mode, the hypervisor allows guests to control certain aspects of memory management through hypercalls. In some scenarios, this can lead to improper handling of requests—specifically during page removal and insertion operations—allowing for potential memory inconsistencies and exploitation by malicious actors. A single patch has been provided that addresses both this and a related issue.
Affected Version(s)
xen 4.14.x
xen 4.12.x
xen 4.15.x
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Jan Beulich of SUSE.'}]}}}