Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-33747
HistoryOct 11, 2022 - 1:15 p.m.

CVE-2022-33747

2022-10-1113:15:10
Debian Security Bug Tracker
security-tracker.debian.org
17
arm
memory consumption
2nd-level page tables
global memory pool
malicious guest

CVSS3

3.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

EPSS

0.001

Percentile

18.1%

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest’s P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian11allxen< 4.14.5+86-g1c354767d5-1xen_4.14.5+86-g1c354767d5-1_all.deb
Debian999allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian13allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb

CVSS3

3.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

EPSS

0.001

Percentile

18.1%