First published: Wed Jun 30 2021(Updated: )
xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | >=4.12.0<=4.15.0 | |
Xen xen-unstable | =4.15.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2021-28693 vulnerability is considered to have a moderate severity due to potential data leakage from boot modules.
To mitigate CVE-2021-28693, users should upgrade to a patched version of Xen that includes the necessary scrubbing of boot modules.
CVE-2021-28693 affects Xen versions between 4.12.0 and 4.15.0, including the specific 4.15.0-rc1 release.
CVE-2021-28693 is a security vulnerability that primarily relates to improper handling of sensitive data during the boot process.
CVE-2021-28693 requires local access to the Xen environment for exploitation, which limits the potential for remote attacks.