xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/202107-30 | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-372.txt | Vendor Advisory |
https://security.gentoo.org/glsa/202107-30 | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-372.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.gentoo.org/glsa/202107-30 - Third Party Advisory | |
References | () https://xenbits.xenproject.org/xsa/advisory-372.txt - Vendor Advisory |
Information
Published : 2021-06-30 11:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-28693
Mitre link : CVE-2021-28693
CVE.ORG link : CVE-2021-28693
JSON object : View
Products Affected
xen
- xen
CWE