Data Leakage Vulnerability in Linux Disk and NIC Frontends by Xen Project
CVE-2022-33741

7.1HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
5 July 2022

Summary

The vulnerability arises due to improperly managed memory regions by Linux block and network frontends. In particular, these frontends fail to zero out specific memory regions prior to sharing them with the backend, which may allow unauthorized data exposure. Furthermore, the limitations in the granularity of the grant table restrict sharing to a minimum of a 4K page, meaning that unrelated data could coexist within the same page. This could potentially lead to backend systems accessing sensitive or unrelated data, increasing the attack surface significantly.

Affected Version(s)

Linux consult Xen advisory XSA-403

xen consult Xen advisory XSA-403

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'The issue related to not zeroing memory areas used for shared communications\nwas discovered by Roger Pau Monné of Citrix.\n\nThe issue related to leaking contiguous data in granted pages was disclosed\npublicly.'}]}}}
.