First published: Thu Feb 18 2021(Updated: )
An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush, and thus IOMMU updates were not always correct. NOTE: this issue exists because of an incomplete fix for CVE-2020-15565.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=3.2.0<4.12.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27379 is classified as a high severity vulnerability due to its potential to cause denial of service or privilege escalation.
To fix CVE-2021-27379, upgrade Xen to a version that is not affected, such as 4.11.4+107-gef32c7afa2-1 or later.
CVE-2021-27379 affects Xen versions up to and including 4.11.x, specifically on x86 Intel HVM guest OS installations.
Yes, CVE-2021-27379 can potentially allow a denial of service condition, leading to a host OS crash.
CVE-2021-27379 results from a missed flush in a backport, leading to incorrect IOMMU updates and unintended DMA access.