製品・ソフトウェアに関する情報
Xen における情報漏えいに関する脆弱性
Title Xen における情報漏えいに関する脆弱性
Summary

Xen には、情報漏えいに関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date June 27, 2018, midnight
Registration Date Sept. 21, 2018, 5:40 p.m.
Last Update Sept. 21, 2018, 5:40 p.m.
CVSS3.0 : 緊急
Score 9.9
Vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS2.0 : 警告
Score 6.5
Vector AV:N/AC:L/Au:S/C:P/I:P/A:P
Affected System
Debian
Debian GNU/Linux 
Xen プロジェクト
Xen 4.7 から 4.10.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年09月21日]
  掲載
Sept. 21, 2018, 5:40 p.m.

NVD Vulnerability Information
CVE-2018-12892
Summary

An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as "sd" in the libxl disk configuration, or an equivalent) are affected. IDE disks ("hd") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.

Publication Date July 3, 2018, 2:29 a.m.
Registration Date March 1, 2021, 6:51 p.m.
Last Update Nov. 21, 2024, 12:46 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* 4.7.0 4.10.1
Related information, measures and tools
Common Vulnerabilities List