Логотип exploitDog
bind:"CVE-2021-28694"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-28694"

Количество 15

Количество 15

ubuntu логотип

CVE-2021-28694

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2021-28694

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2021-28694

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-7h6m-rq82-825p

больше 3 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2022-01693

больше 4 лет назад

Уязвимость гипервизора Xen, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2943-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2923-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1236-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2925-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2923-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2922-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3322-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2957-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2955-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2924-1

больше 4 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-28694

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-28694

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-28694

IOMMU page mapping issues on x86 T[his CNA information record relates ...

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-7h6m-rq82-825p

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-01693

Уязвимость гипервизора Xen, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2943-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2923-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1236-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2925-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2923-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2922-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3322-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2957-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2955-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2924-1

Security update for xen

больше 4 лет назад

Уязвимостей на страницу