Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-42333
HistoryMar 21, 2023 - 12:00 a.m.

CVE-2022-42333

2023-03-2100:00:00
ubuntu.com
ubuntu.com
13
cachability control
hvm guests
passed through devices
interface
privileged entities
qemu
dom0
stub-domain
controlled regions
serialization
debian
hypervisor

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

56.1%

x86/HVM pinned cache attributes mis-handling T[his CNA information record
relates to multiple CVEs; the text explains which aspects/vulnerabilities
correspond to which CVE.] To allow cachability control for HVM guests with
passed through devices, an interface exists to explicitly override defaults
which would otherwise be put in place. While not exposed to the affected
guests themselves, the interface specifically exists for domains
controlling such guests. This interface may therefore be used by not fully
privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running
in a so called stub-domain. With this exposure it is an issue that - the
number of the such controlled regions was unbounded (CVE-2022-42333), -
installation and removal of such regions was not properly serialized
(CVE-2022-42334).

Bugs

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

56.1%