Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-42333
HistoryMar 21, 2023 - 1:15 p.m.

CVE-2022-42333

2023-03-2113:15:12
Debian Security Bug Tracker
security-tracker.debian.org
9
cve-2022-42333
cachability control
hvm guests
passed through devices

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

51.8%

x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb
Debian11allxen< 4.14.5+94-ge49571868d-1xen_4.14.5+94-ge49571868d-1_all.deb
Debian999allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb
Debian13allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

51.8%