5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
13.3%
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by
Xen. Grant mapping operations often occur in batch hypercalls, where a
number of operations are done in a single hypercall, the success or failure
of each one is reported to the backend driver, and the backend driver then
loops over the results, performing follow-up actions based on the success
or failure of each operation. Unfortunately, when running in PV mode, the
Linux backend drivers mishandle this: Some errors are ignored, effectively
implying their success from the success of related batch elements. In other
cases, errors resulting from one batch element lead to further batch
elements not being inspected, and hence successful ones to not be possible
to properly unmap upon error recovery. Only systems with Linux backends
running in PV mode are vulnerable. Linux backends run in HVM / PVH modes
are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | linux | < 4.4.0-208.240) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux | < 4.15.0-143.147 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-71.79 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1126.140) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1102.109 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1043.45 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1090.94) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1043.45~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1102.109~16.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1044.46 | UNKNOWN |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
13.3%