Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/07/05/4 | Mailing List Patch Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-406.html | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-406.txt | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/07/05/4 | Mailing List Patch Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-406.html | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-406.txt | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/07/05/4 - Mailing List, Patch, Third Party Advisory | |
References | () http://xenbits.xen.org/xsa/advisory-406.html - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5191 - Third Party Advisory | |
References | () https://xenbits.xenproject.org/xsa/advisory-406.txt - Vendor Advisory |
Information
Published : 2022-07-05 13:15
Updated : 2024-11-21 07:08
NVD link : CVE-2022-33744
Mitre link : CVE-2022-33744
CVE.ORG link : CVE-2022-33744
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE