漏洞标题
X86 IOMMU身份映射错误处理漏洞
漏洞描述信息
系统中的某些PCI设备可能会被分配保留内存区域(通过保留内存区域报告“RMRR”指定),用于Intel VT-d或AMD-Vi的Unity Mapping范围。这些区域通常用于平台任务,如传统的USB模拟。
由于这些区域的具体用途未知,一旦与这些区域相关联的设备处于激活状态,这些区域的映射需要持续由设备访问。在建立这些映射的逻辑中,错误处理存在缺陷,可能导致这些映射在本应被移除的情况下仍然存在。相关虚拟机将因此获得访问本不应访问的内存区域的权限。
CVSS信息
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
漏洞类别
信息暴露
漏洞标题
error handling in x86 IOMMU identity mapping
漏洞描述信息
Certain PCI devices in a system might be assigned Reserved Memory
Regions (specified via Reserved Memory Region Reporting, "RMRR") for
Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used
for platform tasks such as legacy USB emulation.
Since the precise purpose of these regions is unknown, once a device
associated with such a region is active, the mappings of these regions
need to remain continuouly accessible by the device. In the logic
establishing these mappings, error handling was flawed, resulting in
such mappings to potentially remain in place when they should have been
removed again. Respective guests would then gain access to memory
regions which they aren't supposed to have access to.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Xen 安全漏洞
漏洞描述信息
Xen是Xen开源的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 4.16.x之前版本存在安全漏洞,该漏洞源于建立预留内存区域映射时,错误处理逻辑存在缺陷,可能导致应在移除的内存映射持续保留,从而使相应的虚拟机获得不应有的内存区域访问权限。
CVSS信息
N/A
漏洞类别
其他