7.1
CWE
269
Advisory Published
Updated

CVE-2021-28692

First published: Wed Jun 30 2021(Updated: )

inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded.

Credit: security@xen.org

Affected SoftwareAffected VersionHow to fix
debian/xen
4.11.4+107-gef32c7afa2-1
4.14.6-1
4.14.5+94-ge49571868d-1
4.17.1+2-gb773c48e36-1
4.17.2+55-g0b56bed864-1
Xen xen-unstable>=3.2.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-28692?

    CVE-2021-28692 has a medium severity rating due to potential impacts on system stability and security.

  • How do I fix CVE-2021-28692?

    To fix CVE-2021-28692, upgrade the Xen package to a version equal to or greater than 4.11.4+107-gef32c7afa2-1 or any other patched version.

  • What systems are affected by CVE-2021-28692?

    CVE-2021-28692 affects Xen versions starting from 3.2.0 up to the versions that have not been patched.

  • What is the nature of the vulnerability in CVE-2021-28692?

    CVE-2021-28692 involves inappropriate timeout detection and handling in IOMMUs, which may lead to delays in command processing.

  • Is there a workaround for CVE-2021-28692 before a patch is applied?

    Currently, there are no recommended workarounds for CVE-2021-28692, and applying the security patch is essential for protection.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203