x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
References
Link | Resource |
---|---|
https://xenbits.xenproject.org/xsa/advisory-428.txt | Vendor Advisory |
http://xenbits.xen.org/xsa/advisory-428.html | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/03/21/2 | Mailing List Third Party Advisory |
https://www.debian.org/security/2023/dsa-5378 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/ | Mailing List Third Party Advisory |
Configurations
History
27 Mar 2023, 22:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5378 - Third Party Advisory | |
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-428.txt - Vendor Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/ - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-428.html - Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2023/03/21/2 - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* |
|
First Time |
Debian debian Linux
Xen Debian Fedoraproject Fedoraproject fedora Xen xen |
27 Mar 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Mar 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Mar 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Mar 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Mar 2023, 13:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-21 13:15
Updated : 2023-03-27 22:24
NVD link : CVE-2022-42334
Mitre link : CVE-2022-42334
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
xen
- xen
CWE
CWE-770
Allocation of Resources Without Limits or Throttling