[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-33745Date: (C)2022-07-27   (M)2024-05-24


insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score :
Exploit Score: 2.0Exploit Score:
Impact Score: 6.0Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: LOWAuthentication:
User Interaction: NONEConfidentiality:
Scope: CHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-5272
FEDORA-2022-4f7cd241e2
FEDORA-2022-a0d7a5eaf2
http://www.openwall.com/lists/oss-security/2022/07/26/2
http://www.openwall.com/lists/oss-security/2022/07/26/3
http://xenbits.xen.org/xsa/advisory-408.html
https://xenbits.xenproject.org/xsa/advisory-408.txt

OVAL    14
oval:org.secpod.oval:def:123962
oval:org.secpod.oval:def:610240
oval:org.secpod.oval:def:88426
oval:org.secpod.oval:def:3300868
...

© SecPod Technologies