Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-28709
HistoryNov 24, 2021 - 12:00 a.m.

CVE-2021-28709

2021-11-2400:00:00
ubuntu.com
ubuntu.com
14

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

26.6%

issues with partially successful P2M updates on x86 T[his CNA information
record relates to multiple CVEs; the text explains which
aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests
may be started in populate-on-demand (PoD) mode, to provide a way for them
to later easily have more memory assigned. Guests are permitted to control
certain P2M aspects of individual pages via hypercalls. These hypercalls
may act on ranges of pages specified via page orders (resulting in a
power-of-2 number of pages). In some cases the hypervisor carries out the
requests by splitting them into smaller chunks. Error handling in certain
PoD cases has been insufficient in that in particular partial success of
some operations was not properly accounted for. There are two code paths
affected - page removal (CVE-2021-28705) and insertion of new pages
(CVE-2021-28709). (We provide one patch which combines the fix to both
issues.)

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

26.6%