René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

158 lines
5.1 KiB
JSON

{
"id": "CVE-2022-33744",
"sourceIdentifier": "security@xen.org",
"published": "2022-07-05T13:15:08.653",
"lastModified": "2022-10-29T02:50:22.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages."
},
{
"lang": "es",
"value": "Los invitados Arm pueden causar DoS Dom0 por medio de dispositivos PV Al mapear p\u00e1ginas de invitados en Arm, dom0 est\u00e1 utilizando un rbtree para llevar a cabo un seguimiento de las asignaciones externas. La actualizaci\u00f3n de ese rbtree no siempre es realizado completamente con el bloqueo relacionado, resultando en una peque\u00f1a ventana de carrera, que invitados no privilegiados pueden usar por medio de dispositivos PV para causar inconsistencias en el rbtree. Estas incoherencias pueden dar lugar a la denegaci\u00f3n de servicio (DoS) de dom0, por ejemplo, provocando bloqueos o imposibilidad de llevar a cabo m\u00e1s asignaciones de las p\u00e1ginas de memoria de otros invitados"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndIncluding": "5.18",
"matchCriteriaId": "302A24D5-22B1-48C5-B2E1-4AFBF68BC855"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/07/05/4",
"source": "security@xen.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://xenbits.xen.org/xsa/advisory-406.html",
"source": "security@xen.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
"source": "security@xen.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2022/dsa-5191",
"source": "security@xen.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://xenbits.xenproject.org/xsa/advisory-406.txt",
"source": "security@xen.org",
"tags": [
"Vendor Advisory"
]
}
]
}