First published: Tue Jul 26 2022(Updated: )
insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | ||
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33745 is a vulnerability that allows insufficient TLB flush for x86 PV guests in shadow mode.
CVE-2022-33745 affects Xen, specifically x86 PV guests in shadow paging mode.
The severity of CVE-2022-33745 is high with a CVSS score of 8.8.
To fix CVE-2022-33745 on Debian Linux, update the Xen package to version 4.14.6-1 or later.
To fix CVE-2022-33745 on Fedora, update the Xen package to version 4.17.2+55-g0b56bed864-1 or later.