Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-07435

Опубликовано: 13 авг. 2024
Источник: fstec
CVSS3: 7.5
CVSS2: 5.9
EPSS Низкий

Описание

Уязвимость компонента x86 IOMMU Identity Mapping кроссплатформенного гипервизора Xen связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю оказывать влияние на конфиденциальность, целостность и доступность системы

Вендор

Сообщество свободного программного обеспечения
ООО «Ред Софт»
Fedora Project
The Linux Foundation

Наименование ПО

Debian GNU/Linux
РЕД ОС
Fedora
Xen

Версия ПО

11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
40 (Fedora)
от 4.0 до 4.18.3 (Xen)

Тип ПО

Операционная система
ПО виртуализации/ПО виртуального программно-аппаратного средства

Операционные системы и аппаратные платформы

ООО «Ред Софт» РЕД ОС 7.3

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,5)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
Для Xen:
https://Xenbits.Xen.org/xsa/advisory-460.html
Для РедоС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Fedora:
https://linuxsecurity.com/advisories/fedora/fedora-40-xen-2024-91ddad6c8b-security-advisory-updates-9wfm4vq3zll9
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2024-31145

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 13%
0.00045
Низкий

7.5 High

CVSS3

5.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
9 месяцев назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

CVSS3: 7.5
nvd
9 месяцев назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

CVSS3: 7.5
debian
9 месяцев назад

Certain PCI devices in a system might be assigned Reserved Memory Regi ...

CVSS3: 7.5
github
9 месяцев назад

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.

suse-cvrf
10 месяцев назад

Security update for xen

EPSS

Процентиль: 13%
0.00045
Низкий

7.5 High

CVSS3

5.9 Medium

CVSS2