First published: Mon Jul 04 2022(Updated: )
A flaw memory leak in the Linux Kernel XDP (eXpress Data Path) was found. It can lead to denial of service for some specific configurations like if the non root privileged user from the host system can send malicious packets to the guest systems. This flaw actual for the Linux Kernel versions 5.9 - 5.18. References: <a href="https://www.openwall.com/lists/oss-security/2022/07/05/5">https://www.openwall.com/lists/oss-security/2022/07/05/5</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7&id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7&id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26</a>
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/Linux kernel | <5.19 | 5.19 |
Linux Kernel | >=5.9<=5.18 | |
Xen XAPI | ||
Debian Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33743 is classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2022-33743, upgrade to a patched version of the Linux Kernel, specifically 5.14.0-284.11.1.el9_2 or later.
CVE-2022-33743 affects Linux Kernel versions from 5.9 up to, but not including, 5.19.
Yes, a non-root privileged user can exploit CVE-2022-33743 by sending malicious packets to guest systems.
CVE-2022-33743 affects systems running specific versions of the Linux Kernel, Xen hypervisor, and Debian Linux.