CVE-2021-28688
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.
La solución para XSA-365 incluye la inicialización de punteros de modo que el código de limpieza posterior no utilice valores no inicializados o obsoletos. Esta inicialización fue demasiado lejos y, en determinadas condiciones, también puede sobrescribir los punteros que están requiriendo una limpieza. La falta de limpieza resultaría en fugas de subsidios persistentes. A su vez, la filtración impediría a una limpieza completa después de que un invitado respectivo haya terminado, dejando dominios zombies. Todas las versiones de Linux que presentan la corrección para XSA-365 aplicada son vulnerables. XSA-365 se clasificó para afectar a las versiones de al menos 3.11
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-18 CVE Reserved
- 2021-04-06 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-665: Improper Initialization
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://xenbits.xenproject.org/xsa/advisory-371.txt | 2022-05-27 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 <= 5.10.18 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 <= 5.10.18" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|