First published: Fri Aug 27 2021(Updated: )
inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | >=4.10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =11.0 | |
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28699 is a vulnerability that involves an inadequate grant-v2 status frames array bounds check in Xen.
CVE-2021-28699 has a severity rating of 5.5 (medium).
CVE-2021-28699 can allow a guest to cause a host denial of service or potentially execute arbitrary code.
Xen versions up to and including 4.11.4+107-gef32c7afa2-1, as well as Debian 11.0, Fedora 33, Fedora 34, and Fedora 35, are affected by CVE-2021-28699.
To fix CVE-2021-28699, you should update to Xen version 4.14.6-1 or later, or apply the appropriate updates provided by your Linux distribution.