{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-28706","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","assignerShortName":"XEN","dateUpdated":"2024-08-03T21:47:33.187Z","dateReserved":"2021-03-18T00:00:00.000Z","datePublished":"2021-11-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2024-02-04T08:06:49.398Z"},"descriptions":[{"lang":"en","value":"guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound."}],"affected":[{"vendor":"Xen","product":"xen","versions":[{"version":"4.12.x","status":"affected"}]},{"vendor":"Xen","product":"xen","versions":[{"version":"unspecified","lessThan":"4.12","status":"unknown","versionType":"custom"},{"version":"4.14.x","status":"affected","lessThan":"unspecified","versionType":"custom"},{"version":"next of 4.15.x","status":"unaffected","lessThan":"unspecified","versionType":"custom"}]},{"vendor":"Xen","product":"xen","versions":[{"version":"xen-unstable","status":"affected"}]},{"vendor":"Xen","product":"xen","versions":[{"version":"4.13.x","status":"affected"}]}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-385.txt"},{"name":"FEDORA-2021-03645e9807","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/"},{"name":"DSA-5017","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2021/dsa-5017"},{"name":"FEDORA-2021-2b3a2de94f","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/"},{"name":"GLSA-202402-07","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202402-07"}],"credits":[{"lang":"en","value":"{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Julien Grall of Amazon.'}]}}}"}],"metrics":[{"other":{"type":"unknown","content":{"description":{"description_data":[{"lang":"eng","value":"A guest may be able too allocate unbounded amounts of memory to itself.\nThis may result in a Denial of Service (DoS) affecting the entire host."}]}}}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"unknown"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T21:47:33.187Z"},"title":"CVE Program Container","references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-385.txt","tags":["x_transferred"]},{"name":"FEDORA-2021-03645e9807","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/"},{"name":"DSA-5017","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2021/dsa-5017"},{"name":"FEDORA-2021-2b3a2de94f","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/"},{"name":"GLSA-202402-07","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202402-07"}]}]}}