Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-33745

Опубликовано: 26 июл. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.8

Описание

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/bionic

needs-triage

esm-infra/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

Показывать по

EPSS

Процентиль: 12%
0.00042
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS3: 8.8
debian
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration ...

CVSS3: 8.8
github
почти 3 года назад

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.

CVSS3: 8.8
fstec
почти 3 года назад

Уязвимость компонента Shadow Mode кроссплатформенного гипервизора Xen ядра операционной системы Linux, связанная с недостаточной проверкой входных данных, позволяющая нарушителю повысить свои привилегии

suse-cvrf
почти 3 года назад

Security update for xen

EPSS

Процентиль: 12%
0.00042
Низкий

8.8 High

CVSS3