First published: Fri Mar 05 2021(Updated: )
An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.39<4.4.260 | |
Linux Kernel | >=4.5.0<4.9.260 | |
Linux Kernel | >=4.10.0<4.14.224 | |
Linux Kernel | >=4.15.0<4.19.179 | |
Linux Kernel | >=4.20.0<5.4.103 | |
Linux Kernel | >=5.10.0<5.10.21 | |
Linux Kernel | >=5.11.0<5.11.4 | |
Linux Kernel | =5.12-rc1 | |
Linux Kernel | =5.12-rc2 | |
Debian Debian Linux | =9.0 | |
netapp cloud backup | ||
netapp solidfire baseboard management controller firmware | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28038 has been classified as a high severity vulnerability due to its potential to cause denial of service in the host operating system.
To fix CVE-2021-28038, upgrade to the recommended patched versions of the Linux kernel including 5.10.223-1 or later.
CVE-2021-28038 affects various versions of the Linux kernel from 2.6.39 to 5.11.3, especially those used in Xen PV environments.
CVE-2021-28038 can be exploited by attackers to trigger a denial of service condition in the host OS through specific error handling in the netback driver.
Currently, the recommended mitigation for CVE-2021-28038 is to apply the available updates or patches for the Linux kernel rather than relying on a workaround.