[XSA-391] Rogue backends can cause DoS of guests via high frequency events
ISSUE DESCRIPTION
Xen offers the ability to run PV backends in regular unprivileged
guests, typically referred to as "driver domains". Running PV backends
in driver domains has one primary security advantage: if a driver domain
gets compromised, it doesn't have the privileges to take over the
system.
However, a malicious driver domain could try to attack other guests via
sending events at a high frequency leading to a Denial of Service in the
guest due to trying to service interrupts for elongated amounts of time.
There are three affected backends:
* blkfront patch 1, CVE-2021-28711
* netfront patch 2, CVE-2021-28712
* hvc_xen (console) patch 3, CVE-2021-28713
IMPACT
Potentially malicious PV backends can cause guest DoS due to unhardened
frontends in the guests, even though this ought to have been prevented by
containing them within a driver domain.
VULNERABLE SYSTEMS
All guests being serviced by potentially malicious backends are vulnerable,
even if those backends are running in a less privileged environment. The
vulnerability is not affecting the host, but the guests.
Package | Affected Version |
---|---|
pkg:generic/xen | = 5.15 |
- ID
- XSA-391
- Severity
- medium
- Severity from
- CVE-2021-28711
- URL
- http://xenbits.xen.org/xsa/advisory-391.html
- Published
-
2021-12-20T09:54:00
(2 years ago) - Modified
-
2021-12-20T09:54:00
(2 years ago) - Rights
- Xen Project
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2023-1688
- ALAS2-2022-1749
- DSA-5050-1
- DSA-5096-1
- FEDORA-2021-4f1a2cdf2e
- FEDORA-2021-e6cbca1e9e
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0366-1
- SSA:2022-031-01
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0477-1
- USN-5278-1
- USN-5298-1
- USN-5337-1
- USN-5338-1
- USN-5368-1
- USN-5377-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-391 | Security Advisory | http://xenbits.xen.org/xsa/advisory-391.html |
Xen Project | XSA-391 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-391.txt |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:generic/xen | xen | = 5.15 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |