CVE-2021-28688
Ubuntu Security Notice USN-4946-1
Severity Score
Exploit Likelihood
Affected Versions
2Public Exploits
0Exploited in Wild
-Decision
Descriptions
The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.
La solución para XSA-365 incluye la inicialización de punteros de modo que el código de limpieza posterior no utilice valores no inicializados o obsoletos. Esta inicialización fue demasiado lejos y, en determinadas condiciones, también puede sobrescribir los punteros que están requiriendo una limpieza. La falta de limpieza resultaría en fugas de subsidios persistentes. A su vez, la filtración impediría a una limpieza completa después de que un invitado respectivo haya terminado, dejando dominios zombies. Todas las versiones de Linux que presentan la corrección para XSA-365 aplicada son vulnerables. XSA-365 se clasificó para afectar a las versiones de al menos 3.11
It was discovered that the DRM subsystem in the Linux kernel contained double-free vulnerabilities. A privileged attacker could possibly use this to cause a denial of service or possibly execute arbitrary code. Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Schoenherr discovered that the Xen paravirtualization backend in the Linux kernel did not properly propagate errors to frontend drivers in some situations. An attacker in a guest VM could possibly use this to cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-18 CVE Reserved
- 2021-04-06 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-665: Improper Initialization
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|