CVE-2021-28706Allocation of Resources Without Limits or Throttling in XEN

Severity
8.6HIGHNVD
EPSS
0.2%
top 63.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 24
Latest updateMay 24

Description

guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages4 packages

CVEListV5xen/xen4.14.xunspecified+3
NVDxen/xen3.24.12
debiandebian/xen< xen 4.14.3+32-g9de3671772-1 (bookworm)
Debianxen/xen< 4.14.3+32-g9de3671772-1~deb11u1+3

Also affects: Debian Linux 11.0, Fedora 34, 35

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x89c-76jf-xx4h: guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to incr2022-05-24
OSV
CVE-2021-28706: guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to incr2021-11-24

📋Vendor Advisories

1
Debian
CVE-2021-28706: xen - guests may exceed their designated memory limit When a guest is permitted to hav...2021