Vulnerability Description
insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | All versions |
| Debian | Debian Linux | 11.0 |
| Fedoraproject | Fedora | 35 |
References
- http://www.openwall.com/lists/oss-security/2022/07/26/2Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/07/26/3Mailing ListPatchThird Party Advisory
- http://xenbits.xen.org/xsa/advisory-408.htmlPatchVendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.debian.org/security/2022/dsa-5272Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-408.txtVendor Advisory
- http://www.openwall.com/lists/oss-security/2022/07/26/2Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/07/26/3Mailing ListPatchThird Party Advisory
- http://xenbits.xen.org/xsa/advisory-408.htmlPatchVendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.debian.org/security/2022/dsa-5272Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-408.txtVendor Advisory
FAQ
What is CVE-2022-33745?
CVE-2022-33745 is a vulnerability with a CVSS score of 8.8 (HIGH). insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, c...
How severe is CVE-2022-33745?
CVE-2022-33745 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-33745?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Debian Debian Linux, Fedoraproject Fedora.