{"api_version":"1","generated_at":"2026-04-22T23:52:29+00:00","cve":"CVE-2021-28702","urls":{"html":"https://cve.report/CVE-2021-28702","api":"https://cve.report/api/cve/CVE-2021-28702.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-28702","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-28702"},"summary":{"title":"CVE-2021-28702","description":"PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.","state":"PUBLIC","assigner":"security@xen.org","published_at":"2021-10-06 14:15:00","updated_at":"2023-11-07 03:32:00"},"problem_types":["CWE-269"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OIHEJ3R3EH5DYI2I5UMD2ULJ2ELA3EX/","name":"FEDORA-2021-829f5f2f43","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: xen-4.15.1-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2021/10/07/2","name":"[oss-security] 20211007 Xen Security Advisory 386 v2 (CVE-2021-28702) - PCI devices with RMRRs not deassigned correctly","refsource":"MLIST","tags":[],"title":"oss-security - Xen Security Advisory 386 v2 (CVE-2021-28702) - PCI devices with\n RMRRs not deassigned correctly","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202208-23","name":"GLSA-202208-23","refsource":"GENTOO","tags":[],"title":"Xen: Multiple Vulnerabilities (GLSA 202208-23) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDPRMOBBLS74ONYP3IXZZXSTLKR7GRQB/","name":"FEDORA-2021-0b7a484688","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: xen-4.14.3-2.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAWV6PO2KUGVZTESERECOBUBZ6X45I7/","name":"FEDORA-2021-80bbe7def0","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: xen-4.14.3-2.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDPRMOBBLS74ONYP3IXZZXSTLKR7GRQB/","name":"FEDORA-2021-0b7a484688","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: xen-4.14.3-2.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2021/dsa-5017","name":"DSA-5017","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5017-1 xen","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OIHEJ3R3EH5DYI2I5UMD2ULJ2ELA3EX/","name":"FEDORA-2021-829f5f2f43","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: xen-4.15.1-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRAWV6PO2KUGVZTESERECOBUBZ6X45I7/","name":"FEDORA-2021-80bbe7def0","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: xen-4.14.3-2.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://xenbits.xenproject.org/xsa/advisory-386.txt","name":"https://xenbits.xenproject.org/xsa/advisory-386.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-28702","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28702","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"28702","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28702","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28702","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28702","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28702","vulnerable":"1","versionEndIncluding":"4.15.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-28702","qid":"184281","title":"Debian Security Update for xen (CVE-2021-28702)"},{"cve":"CVE-2021-28702","qid":"281988","title":"Fedora Security Update for xen (FEDORA-2021-0b7a484688)"},{"cve":"CVE-2021-28702","qid":"281989","title":"Fedora Security Update for xen (FEDORA-2021-80bbe7def0)"},{"cve":"CVE-2021-28702","qid":"500804","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28702","qid":"501521","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28702","qid":"501799","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28702","qid":"502458","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28702","qid":"504546","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28702","qid":"710600","title":"Gentoo Linux Xen Multiple Vulnerabilities (GLSA 202208-23)"},{"cve":"CVE-2021-28702","qid":"751411","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:3852-1)"},{"cve":"CVE-2021-28702","qid":"751454","title":"OpenSUSE Security Update for xen (openSUSE-SU-2021:1543-1)"},{"cve":"CVE-2021-28702","qid":"751474","title":"OpenSUSE Security Update for xen (openSUSE-SU-2021:3968-1)"},{"cve":"CVE-2021-28702","qid":"751477","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:3977-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@xen.org","ID":"CVE-2021-28702","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"xen","version":{"version_data":[{"version_affected":"?<","version_value":"4.12"},{"version_affected":">=","version_value":"4.12.x"},{"version_affected":"!>","version_value":"xen-unstable"}]}}]},"vendor_name":"Xen"}]}},"configuration":{"configuration_data":{"description":{"description_data":[{"lang":"eng","value":"All versions of Xen from at least 4.4 onwards are vulnerable.\n\nOnly Intel x86 systems are affected.  AMD x86 systems, and Arm\nsystems, are all unaffected.\n\nOnly systems using PCI passthrough are affected.  (And then, only if\nthe assigned devices have RMRRs, but whether a device advertises RMRRs\nis not easy to discern.)"}]}}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption."}]},"impact":{"impact_data":{"description":{"description_data":[{"lang":"eng","value":"Administrators of guests which have been assigned RMRR-using PCI\ndevices can cause denial of service and other problems, possibly\nincluding escalation of privilege."}]}}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"unknown"}]}]},"references":{"reference_data":[{"url":"https://xenbits.xenproject.org/xsa/advisory-386.txt","refsource":"MISC","name":"https://xenbits.xenproject.org/xsa/advisory-386.txt"},{"refsource":"MLIST","name":"[oss-security] 20211007 Xen Security Advisory 386 v2 (CVE-2021-28702) - PCI devices with RMRRs not deassigned correctly","url":"http://www.openwall.com/lists/oss-security/2021/10/07/2"},{"refsource":"FEDORA","name":"FEDORA-2021-80bbe7def0","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRAWV6PO2KUGVZTESERECOBUBZ6X45I7/"},{"refsource":"FEDORA","name":"FEDORA-2021-0b7a484688","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDPRMOBBLS74ONYP3IXZZXSTLKR7GRQB/"},{"refsource":"FEDORA","name":"FEDORA-2021-829f5f2f43","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OIHEJ3R3EH5DYI2I5UMD2ULJ2ELA3EX/"},{"refsource":"DEBIAN","name":"DSA-5017","url":"https://www.debian.org/security/2021/dsa-5017"},{"refsource":"GENTOO","name":"GLSA-202208-23","url":"https://security.gentoo.org/glsa/202208-23"}]},"workaround":{"workaround_data":{"description":{"description_data":[{"lang":"eng","value":"There is no mitigation (other than not passing through PCI devices\nwith RMRRs to guests)."}]}}}},"nvd":{"publishedDate":"2021-10-06 14:15:00","lastModifiedDate":"2023-11-07 03:32:00","problem_types":["CWE-269"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.6,"baseSeverity":"HIGH"},"exploitabilityScore":0.9,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13.0","versionEndIncluding":"4.15.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"28702","Ordinal":"203878","Title":"CVE-2021-28702","CVE":"CVE-2021-28702","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"28702","Ordinal":"1","NoteData":"PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"28702","Ordinal":"2","NoteData":"2021-10-06","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"28702","Ordinal":"3","NoteData":"2021-12-07","Type":"Other","Title":"Modified"}]}}}