CVE-2022-33745
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.
Un vaciado insuficiente del TLB para huéspedes x86 PV en modo de sombra Para la migración, así como para trabajar en torno a los kernels que no son conscientes de L1TF (véase XSA-273), los huéspedes PV pueden ejecutarse en modo de paginación de sombra. Para abordar XSA-401, el código fue movido dentro de una función en Xen. Este movimiento de código pasó por alto una variable que cambiaba de significado/valor entre las posiciones de código antiguas y nuevas. El uso ahora erróneo de la variable conllevaba a una condición errónea de vaciado de la TLB, omitiendo el vaciado cuando era necesario.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-15 CVE Reserved
- 2022-07-26 CVE Published
- 2023-10-31 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2022/07/26/2 | 2023-11-07 | |
http://www.openwall.com/lists/oss-security/2022/07/26/3 | 2023-11-07 | |
http://xenbits.xen.org/xsa/advisory-408.html | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | * | x86 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
|