First published: Tue Mar 21 2023(Updated: )
x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Xen Xen | >=4.11.0<=4.17.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42334 is a vulnerability related to x86/HVM pinned cache attributes mis-handling in Xen.
The severity of CVE-2022-42334 is medium with a severity value of 6.5.
CVE-2022-42334 affects Xen by allowing cachability control for HVM guests with passed through devices.
To fix CVE-2022-42334 on Debian, update the Xen package to version 4.11.4+107-gef32c7afa2-1 or later.
You can find more information about CVE-2022-42334 at the following references: [1] [2] [3].