Incorrect Permission Assignment for Critical Resource Affecting xen-devel package, versions <4.10.4_08-3.28.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
1.02% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES150-XENDEVEL-2722023
  • published14 Apr 2022
  • disclosed16 Dec 2019

Introduced: 16 Dec 2019

CVE-2019-18422  (opens in a new tab)
CWE-732  (opens in a new tab)

How to fix?

Upgrade SLES:15.0 xen-devel to version 4.10.4_08-3.28.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-devel package and not the xen-devel package as distributed by SLES. See How to fix? for SLES:15.0 relevant fixed versions and status.

An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.

CVSS Scores

version 3.1