Allocation of Resources Without Limits or Throttling Affecting xen package, versions <4.14.3+32-g9de3671772-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.43% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-XEN-5701463
  • published24 Nov 2021
  • disclosed24 Nov 2021

Introduced: 24 Nov 2021

CVE-2021-28706  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Debian:13 xen to version 4.14.3+32-g9de3671772-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen package and not the xen package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.

CVSS Scores

version 3.1