Data Leakage in Linux Disk and Network Frontends by Xen Project
CVE-2022-33740

7.1HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
5 July 2022

Summary

The vulnerability affects the Linux Block and Network PV device frontends in the Xen Project, where memory regions are not properly zeroed before they are shared with backend services. This oversight allows unrelated data to persist within the same 4K page, potentially enabling attackers to access sensitive information through these memory leaks. The lack of granularity in the grant table exacerbates the issue, making it a critical concern for systems relying on Xen virtualization for handling disk and network operations.

Affected Version(s)

Linux consult Xen advisory XSA-403

xen consult Xen advisory XSA-403

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'The issue related to not zeroing memory areas used for shared communications\nwas discovered by Roger Pau Monné of Citrix.\n\nThe issue related to leaking contiguous data in granted pages was disclosed\npublicly.'}]}}}
.