CVE-2021-27379Improper Privilege Management in XEN

Severity
7.8HIGHNVD
OSV8.8
EPSS
0.1%
top 78.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18
Latest updateMay 24

Description

An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush, and thus IOMMU updates were not always correct. NOTE: this issue exists because of an incomplete fix for CVE-2020-15565.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDxen/xen3.2.04.12.0
debiandebian/xen< xen 4.14.0+80-gd101b417b7-1 (bookworm)
Debianxen/xen< 4.14.0+80-gd101b417b7-1+3

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f444-f4gw-jhg6: An issue was discovered in Xen through 42022-05-24
OSV
CVE-2021-27379: An issue was discovered in Xen through 42021-02-18

📋Vendor Advisories

1
Debian
CVE-2021-27379: xen - An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS u...2021