SB2022041955 - Debian update for xen
Published: April 19, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Incorrect authorization (CVE-ID: CVE-2022-23033)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to guest_physmap_remove_page() function does not remove p2m mappings. A local user issuing a set/way cache maintenance instruction, then calling the XENMEM_decrease_reservation hypercall to give back memory pages to Xen, can cause information leaks, Denial of Service (DoS), or escalate privileges on the system.
2) Integer underflow (CVE-ID: CVE-2022-23034)
The vulnerability allows a local user can perform a denial of service attack.
The vulnerability exists due to integer underflow when unmapping a grant to address XSA-380. A local user can request two forms of mappings to perform a denial of service attack.
3) Incomplete cleanup (CVE-ID: CVE-2022-23035)
The vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to insufficient cleanup of passed-through device IRQs. An attacker with physical access can cause a Denial of Service (DoS) and escalate privileges on the system.
4) Memory leak (CVE-ID: CVE-2022-26356)
The vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due to racy interactions between dirty vram tracking and paging log dirty hypercalls. A local user can force the application to leak memory and perform denial of service attack.
5) Race condition (CVE-ID: CVE-2022-26357)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in the VT-d domain ID cleanup. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
6) Resource exhaustion (CVE-ID: CVE-2022-26358)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to RMRR (VT-d) and unity map (AMD-Vi) handling issues. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
7) Resource exhaustion (CVE-ID: CVE-2022-26359)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to RMRR (VT-d) and unity map (AMD-Vi) handling issues. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
8) Resource exhaustion (CVE-ID: CVE-2022-26360)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to RMRR (VT-d) and unity map (AMD-Vi) handling issues. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
9) Resource exhaustion (CVE-ID: CVE-2022-26361)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to RMRR (VT-d) and unity map (AMD-Vi) handling issues. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.