Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-33745

Опубликовано: 26 июл. 2022
Источник: debian

Описание

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.16.2-1package
xenend-of-lifebusterpackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-408.html

  • All versions of Xen with the XSA-401 fixes applied are vulnerable

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS3: 8.8
nvd
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS3: 8.8
github
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS3: 8.8
fstec
почти 3 года назад

Уязвимость компонента Shadow Mode кроссплатформенного гипервизора Xen ядра операционной системы Linux, связанная с недостаточной проверкой входных данных, позволяющая нарушителю повысить свои привилегии

suse-cvrf
почти 3 года назад

Security update for xen