Bug 2293254 (CVE-2021-47575)
Summary: | CVE-2021-47575 kernel: xen/console: harden hvc_xen against event channel storms | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | dfreiber, drow, jburrell, mbenatto, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 4.4.296, kernel 4.9.294, kernel 4.14.259, kernel 4.19.222, kernel 5.4.168, kernel 5.10.88, kernel 5.15.11, kernel 5.16 | Doc Type: | If docs needed, set a value |
Doc Text: |
[REJECTED CVE] The Xen console driver (hvc_xen) has a bug in event channel storms, where an excessive number of events sent by the backend could overwhelm the system. The issue stemmed from sending events even when no bytes were read from the backend, causing unnecessary interrupts. Additionally, during the domU initial console setup, there was no XenBus device available when the event channel was bound, complicating event handling.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2293209 |
Description
Avinash Hanwate
2024-06-20 11:05:51 UTC
This CVE has been rejected upstream: https://lore.kernel.org/linux-cve-announce/2024062012-REJECTED-9525@gregkh/ |