Allocation of Resources Without Limits or Throttling Affecting xen-devel package, versions <4.10.4_30-3.68.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.43% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES150-XENDEVEL-2653569
  • published14 Apr 2022
  • disclosed1 Dec 2021

Introduced: 1 Dec 2021

CVE-2021-28706  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade SLES:15.0 xen-devel to version 4.10.4_30-3.68.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-devel package and not the xen-devel package as distributed by SLES. See How to fix? for SLES:15.0 relevant fixed versions and status.

guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.

CVSS Scores

version 3.1