Описание
Azure Linux Agent Information Disclosure Vulnerability
An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks. An authenticated attacker who successfully exploited this vulnerability could view data in swap that is normally hidden.
None of the Azure endorsed distros are vulnerable to this issue by default, but this can occur on customer customized or modified images when swapfile is created by the Azure linux agent and python3 is enabled as the default python version.
This update addresses this vulnerability by preventing how the swap information is accessed.
Меры по смягчению последствий
To mitigate this issue, validate whether the swapfile exists and if so, make sure it is secured by setting its access permissions to root only by executing the following command as root:
sudo chmod 600 /mnt/resource/swapfile
or
sudo chmod 600 /mnt/swapfile
depending on the specific distro.
Please also refer to your specific OS distro advisory for further details and additional mitigation options.
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
Возможность эксплуатации
Publicly Disclosed
Exploited
DOS
EPSS
Связанные уязвимости
An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks, aka 'Azure Linux Agent Information Disclosure Vulnerability'.
An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks, aka 'Azure Linux Agent Information Disclosure Vulnerability'.
An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks, aka 'Azure Linux Agent Information Disclosure Vulnerability'.
An information disclosure vulnerability exists in the way Azure WaLinu ...
EPSS