CVE-2021-28702
📋 TL;DR
This vulnerability allows PCI devices with Reserved Memory Region Reporting (RMRR) to be improperly deassigned when passed through to virtual machine guests. On guest shutdown, the IOMMU configuration points to freed memory structures, potentially causing DMA/interrupt corruption. Affects systems using PCI passthrough with RMRR-enabled devices in virtualization environments.
💻 Affected Systems
- Xen Hypervisor
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Xen by Xen
⚠️ Risk & Real-World Impact
Worst Case
Memory corruption leading to system crashes, data loss, or potential privilege escalation through DMA attacks.
Likely Case
IOMMU faults causing system instability, guest crashes, or denial of service.
If Mitigated
No impact if PCI passthrough with RMRR devices is not used or proper patches are applied.
🎯 Exploit Status
Requires administrative access to virtualization host and specific PCI passthrough configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Xen 4.14.2, 4.13.4, 4.12.5, or 4.11.6
Vendor Advisory: http://www.openwall.com/lists/oss-security/2021/10/07/2
Restart Required: Yes
Instructions:
1. Update Xen to patched version. 2. Reboot hypervisor. 3. Verify no guests are using PCI passthrough with RMRR devices during update.
🔧 Temporary Workarounds
Disable PCI passthrough for RMRR devices
linuxPrevent assignment of PCI devices with RMRR to virtual machine guests
xl pci-assignable-list | grep -i rmrr
xl pci-assignable-remove <device_id>
🧯 If You Can't Patch
- Avoid PCI passthrough for devices with RMRR (check with 'xl pci-assignable-list')
- Isolate virtualization hosts from untrusted networks and limit administrative access
🔍 How to Verify
Check if Vulnerable:
Check Xen version: 'xl info | grep xen_version' and compare to vulnerable versions. Also check for PCI passthrough usage: 'xl list --long'
Check Version:
xl info | grep xen_version
Verify Fix Applied:
Confirm Xen version is 4.14.2, 4.13.4, 4.12.5, or 4.11.6 or newer: 'xl info | grep xen_version'
📡 Detection & Monitoring
Log Indicators:
- IOMMU fault messages in dmesg
- Xen hypervisor crash logs
- Guest VM unexpected shutdowns after PCI device removal
Network Indicators:
- Unusual virtualization management traffic patterns
SIEM Query:
source="xen" AND ("IOMMU" OR "RMRR" OR "deassign")
🔗 References
- http://www.openwall.com/lists/oss-security/2021/10/07/2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OIHEJ3R3EH5DYI2I5UMD2ULJ2ELA3EX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDPRMOBBLS74ONYP3IXZZXSTLKR7GRQB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAWV6PO2KUGVZTESERECOBUBZ6X45I7/
- https://security.gentoo.org/glsa/202208-23
- https://www.debian.org/security/2021/dsa-5017
- https://xenbits.xenproject.org/xsa/advisory-386.txt
- http://www.openwall.com/lists/oss-security/2021/10/07/2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OIHEJ3R3EH5DYI2I5UMD2ULJ2ELA3EX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDPRMOBBLS74ONYP3IXZZXSTLKR7GRQB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAWV6PO2KUGVZTESERECOBUBZ6X45I7/
- https://security.gentoo.org/glsa/202208-23
- https://www.debian.org/security/2021/dsa-5017
- https://xenbits.xenproject.org/xsa/advisory-386.txt