Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-33745
HistoryJul 26, 2022 - 1:15 p.m.

CVE-2022-33745

2022-07-2613:15:10
Debian Security Bug Tracker
security-tracker.debian.org
19

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

14.3%

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.16.2-1xen_4.16.2-1_all.deb
Debian11allxen< 4.14.5+86-g1c354767d5-1xen_4.14.5+86-g1c354767d5-1_all.deb
Debian999allxen< 4.16.2-1xen_4.16.2-1_all.deb
Debian13allxen< 4.16.2-1xen_4.16.2-1_all.deb

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

14.3%