Advisory Published
Updated

CVE-2021-28699

First published: Fri Aug 27 2021(Updated: )

inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing.

Credit: security@xen.org

Affected SoftwareAffected VersionHow to fix
Xen Xen>=4.10.0
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
Debian Debian Linux=11.0
debian/xen<=4.11.4+107-gef32c7afa2-1
4.14.6-1
4.14.5+94-ge49571868d-1
4.17.1+2-gb773c48e36-1
4.17.2+55-g0b56bed864-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-28699?

    CVE-2021-28699 is a vulnerability that involves an inadequate grant-v2 status frames array bounds check in Xen.

  • What is the severity of CVE-2021-28699?

    CVE-2021-28699 has a severity rating of 5.5 (medium).

  • How does CVE-2021-28699 impact Xen?

    CVE-2021-28699 can allow a guest to cause a host denial of service or potentially execute arbitrary code.

  • Which software versions are affected by CVE-2021-28699?

    Xen versions up to and including 4.11.4+107-gef32c7afa2-1, as well as Debian 11.0, Fedora 33, Fedora 34, and Fedora 35, are affected by CVE-2021-28699.

  • How can I fix CVE-2021-28699?

    To fix CVE-2021-28699, you should update to Xen version 4.14.6-1 or later, or apply the appropriate updates provided by your Linux distribution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203