Lucene search

K
cve[email protected]CVE-2021-28706
HistoryNov 24, 2021 - 1:15 a.m.

CVE-2021-28706

2021-11-2401:15:08
CWE-770
web.nvd.nist.gov
45
15
cve-2021-28706
memory limit
hypercall
memory allocation
overflow
nvd
security vulnerability

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.3 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.8%

guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.

Affected configurations

NVD
Node
xenxenRange3.24.12
Node
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
Node
debiandebian_linuxMatch11.0
CPENameOperatorVersion
xen:xenxenlt4.12

CNA Affected

[
  {
    "vendor": "Xen",
    "product": "xen",
    "versions": [
      {
        "version": "4.12.x",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Xen",
    "product": "xen",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "4.12",
        "status": "unknown",
        "versionType": "custom"
      },
      {
        "version": "4.14.x",
        "status": "affected",
        "lessThan": "unspecified",
        "versionType": "custom"
      },
      {
        "version": "next of 4.15.x",
        "status": "unaffected",
        "lessThan": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Xen",
    "product": "xen",
    "versions": [
      {
        "version": "xen-unstable",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Xen",
    "product": "xen",
    "versions": [
      {
        "version": "4.13.x",
        "status": "affected"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.3 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.8%