Логотип exploitDog
bind:CVE-2021-28696
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-28696

Количество 15

Количество 15

ubuntu логотип

CVE-2021-28696

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2021-28696

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2021-28696

больше 4 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-p2f6-35c3-q43f

больше 3 лет назад

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2022-02228

больше 4 лет назад

Уязвимость гипервизора Xen, связанная с неправильной авторизацией, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2943-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2923-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1236-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2925-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2923-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2922-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3322-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2957-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2955-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2924-1

больше 4 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-28696

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-28696

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-28696

IOMMU page mapping issues on x86 T[his CNA information record relates ...

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-p2f6-35c3-q43f

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

CVSS3: 6.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-02228

Уязвимость гипервизора Xen, связанная с неправильной авторизацией, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2943-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2923-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1236-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2925-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2923-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2922-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3322-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2957-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2955-1

Security update for xen

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2924-1

Security update for xen

больше 4 лет назад

Уязвимостей на страницу