Data Leakage Vulnerability in Linux Disk and NIC Frontends by Xen Project
CVE-2022-33741
7.1HIGH
Summary
The vulnerability arises due to improperly managed memory regions by Linux block and network frontends. In particular, these frontends fail to zero out specific memory regions prior to sharing them with the backend, which may allow unauthorized data exposure. Furthermore, the limitations in the granularity of the grant table restrict sharing to a minimum of a 4K page, meaning that unrelated data could coexist within the same page. This could potentially lead to backend systems accessing sensitive or unrelated data, increasing the attack surface significantly.
Affected Version(s)
Linux consult Xen advisory XSA-403
xen consult Xen advisory XSA-403
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'The issue related to not zeroing memory areas used for shared communications\nwas discovered by Roger Pau Monné of Citrix.\n\nThe issue related to leaking contiguous data in granted pages was disclosed\npublicly.'}]}}}