Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-03590

Опубликовано: 01 нояб. 2022
Источник: fstec
CVSS3: 7
CVSS2: 6
EPSS Низкий

Описание

Уязвимость хранилища информации Xenstore гипервизора Xen связана с неполной очисткой временных или вспомогательных ресурсов. Эксплуатация уязвимости может позволить нарушителю получить несанкционированный доступ к защищаемой информации, повысить свои привилегии или вызвать отказ в обслуживании

Вендор

Сообщество свободного программного обеспечения
Fedora Project
Oracle Corp.
АО "НППКТ"
The Linux Foundation

Наименование ПО

Debian GNU/Linux
Fedora
Oracle VM Server for x86
ОСОН ОСнова Оnyx
Xen
Oracle Exadata

Версия ПО

10 (Debian GNU/Linux)
11 (Debian GNU/Linux)
35 (Fedora)
36 (Fedora)
3 (Oracle VM Server for x86)
37 (Fedora)
до 2.8 (ОСОН ОСнова Оnyx)
- (Xen)
21.2.23.0.0 (Patch 35130088) (Oracle Exadata)
21.2.23.0.0 (Patch 35277269) (Oracle Exadata)

Тип ПО

Операционная система
Сетевое средство
ПО виртуализации/ПО виртуального программно-аппаратного средства
СУБД

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 10
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Fedora Project Fedora 35
Fedora Project Fedora 36
Fedora Project Fedora 37
АО "НППКТ" ОСОН ОСнова Оnyx до 2.8

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Xen:
http://xenbits.xen.org/xsa/advisory-417.html
https://xenbits.xenproject.org/xsa/advisory-417.txt
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-42320
https://www.debian.org/security/2022/dsa-5272
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
Для Oracle VM Server:
https://www.oracle.com/security-alerts/ovmbulletinapr2023.html
Для Oracle Exadata:
Обновление до версии 21.2.24.0.0:
https://blogs.oracle.com/exadata/post/software-2023-may
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения xen до версии 4.17.1+2-gb773c48e36-1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 12%
0.0004
Низкий

7 High

CVSS3

6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0.

CVSS3: 7
nvd
больше 3 лет назад

Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0.

CVSS3: 7
debian
больше 3 лет назад

Xenstore: Guests can get access to Xenstore nodes of deleted domains A ...

CVSS3: 7
github
больше 3 лет назад

Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0.

suse-cvrf
около 3 лет назад

Security update for xen

EPSS

Процентиль: 12%
0.0004
Низкий

7 High

CVSS3

6 Medium

CVSS2