vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-33744): Linux kernel (HWE) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:N/I:N/A:P) | Jul 5, 2022 | Sep 21, 2022 | Nov 15, 2024 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:P)
Published
Jul 5, 2022
Added
Sep 21, 2022
Modified
Nov 15, 2024
Description
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1054-dell300xubuntu-upgrade-linux-image-4-15-0-1107-oracleubuntu-upgrade-linux-image-4-15-0-1120-raspi2ubuntu-upgrade-linux-image-4-15-0-1128-kvmubuntu-upgrade-linux-image-4-15-0-1137-gcpubuntu-upgrade-linux-image-4-15-0-1138-snapdragonubuntu-upgrade-linux-image-4-15-0-1142-awsubuntu-upgrade-linux-image-4-15-0-1142-aws-hweubuntu-upgrade-linux-image-4-15-0-1153-azureubuntu-upgrade-linux-image-4-15-0-194-genericubuntu-upgrade-linux-image-4-15-0-194-generic-lpaeubuntu-upgrade-linux-image-4-15-0-194-lowlatencyubuntu-upgrade-linux-image-5-15-0-1003-gkeopubuntu-upgrade-linux-image-5-15-0-1015-ibmubuntu-upgrade-linux-image-5-15-0-1015-raspiubuntu-upgrade-linux-image-5-15-0-1015-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1016-gkeubuntu-upgrade-linux-image-5-15-0-1016-intel-iotgubuntu-upgrade-linux-image-5-15-0-1018-gcpubuntu-upgrade-linux-image-5-15-0-1018-kvmubuntu-upgrade-linux-image-5-15-0-1018-oracleubuntu-upgrade-linux-image-5-15-0-1020-awsubuntu-upgrade-linux-image-5-15-0-1020-azureubuntu-upgrade-linux-image-5-15-0-48-genericubuntu-upgrade-linux-image-5-15-0-48-generic-64kubuntu-upgrade-linux-image-5-15-0-48-generic-lpaeubuntu-upgrade-linux-image-5-15-0-48-lowlatencyubuntu-upgrade-linux-image-5-15-0-48-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1034-ibmubuntu-upgrade-linux-image-5-4-0-1047-bluefieldubuntu-upgrade-linux-image-5-4-0-1054-gkeopubuntu-upgrade-linux-image-5-4-0-1071-raspiubuntu-upgrade-linux-image-5-4-0-1076-kvmubuntu-upgrade-linux-image-5-4-0-1084-gkeubuntu-upgrade-linux-image-5-4-0-1084-oracleubuntu-upgrade-linux-image-5-4-0-1086-awsubuntu-upgrade-linux-image-5-4-0-1090-gcpubuntu-upgrade-linux-image-5-4-0-1092-azure-fdeubuntu-upgrade-linux-image-5-4-0-128-genericubuntu-upgrade-linux-image-5-4-0-128-generic-lpaeubuntu-upgrade-linux-image-5-4-0-128-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04
References
- CVE-2022-33744
- https://attackerkb.com/topics/CVE-2022-33744
- DEBIAN-DSA-5191
- NVD-CVE-2022-33744
- UBUNTU-USN-5572-1
- UBUNTU-USN-5572-2
- UBUNTU-USN-5579-1
- UBUNTU-USN-5623-1
- UBUNTU-USN-5624-1
- UBUNTU-USN-5633-1
- UBUNTU-USN-5635-1
- UBUNTU-USN-5640-1
- UBUNTU-USN-5644-1
- UBUNTU-USN-5648-1
- UBUNTU-USN-5655-1
- UBUNTU-USN-5667-1
- UBUNTU-USN-5668-1
- UBUNTU-USN-5669-1
- UBUNTU-USN-5669-2
- UBUNTU-USN-5677-1
- UBUNTU-USN-5678-1
- UBUNTU-USN-5679-1
- UBUNTU-USN-5682-1
- UBUNTU-USN-5683-1
- UBUNTU-USN-5684-1
- UBUNTU-USN-5687-1
- UBUNTU-USN-5693-1
- UBUNTU-USN-5695-1
- UBUNTU-USN-5703-1
- UBUNTU-USN-5706-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.