Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-07435

Опубликовано: 13 авг. 2024
Источник: fstec
CVSS3: 7.5
CVSS2: 5.9
EPSS Низкий

Описание

Уязвимость компонента x86 IOMMU Identity Mapping кроссплатформенного гипервизора Xen связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю оказывать влияние на конфиденциальность, целостность и доступность системы

Вендор

Сообщество свободного программного обеспечения
ООО «Ред Софт»
Fedora Project
The Linux Foundation
АО "НППКТ"

Наименование ПО

Debian GNU/Linux
РЕД ОС
Fedora
Xen
ОСОН ОСнова Оnyx

Версия ПО

11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
40 (Fedora)
от 4.0 до 4.18.3 (Xen)
до 2.14 (ОСОН ОСнова Оnyx)

Тип ПО

Операционная система
ПО виртуализации/ПО виртуального программно-аппаратного средства

Операционные системы и аппаратные платформы

ООО «Ред Софт» РЕД ОС 7.3
АО "НППКТ" ОСОН ОСнова Оnyx до 2.14

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,5)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
Для Xen:
https://Xenbits.Xen.org/xsa/advisory-460.html
Для РедоС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Fedora:
https://linuxsecurity.com/advisories/fedora/fedora-40-xen-2024-91ddad6c8b-security-advisory-updates-9wfm4vq3zll9
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2024-31145
Обновление программного обеспечения xen до версии 4.17.5+23-ga4e5191dc0-1+deb12u1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 7%
0.00028
Низкий

7.5 High

CVSS3

5.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

CVSS3: 7.5
nvd
около 1 года назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

CVSS3: 7.5
debian
около 1 года назад

Certain PCI devices in a system might be assigned Reserved Memory Regi ...

CVSS3: 7.5
github
около 1 года назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

suse-cvrf
больше 1 года назад

Security update for xen

EPSS

Процентиль: 7%
0.00028
Низкий

7.5 High

CVSS3

5.9 Medium

CVSS2