Description
insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5272-1 | xen security update |
EUVD |
EUVD-2022-36784 | insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary. |
References
History
No history.
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2024-08-03T08:09:22.681Z
Reserved: 2022-06-15T00:00:00.000Z
Link: CVE-2022-33745
No data.
Status : Modified
Published: 2022-07-26T13:15:10.003
Modified: 2024-11-21T07:08:27.353
Link: CVE-2022-33745
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD