Salvatore Bonaccorso
2023-Apr-25 18:55 UTC
[Pkg-xen-devel] Bug#1034842: xen: CVE-2022-42335 (XSA-430)
Source: xen Version: 4.17.0+74-g3eac216e6e-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org> Hi, The following vulnerability was published for xen, affects only 4.17. Filling as RC, to make it on the radar for the bookworm release (and make IMHO sense to try to get it in before release). CVE-2022-42335[0]: | x86 shadow paging arbitrary pointer dereference In environments where | host assisted address translation is necessary but Hardware Assisted | Paging (HAP) is unavailable, Xen will run guests in so called shadow | mode. Due to too lax a check in one of the hypervisor routines used | for shadow page handling it is possible for a guest with a PCI device | passed through to cause the hypervisor to access an arbitrary pointer | partially under guest control. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-42335 https://www.cve.org/CVERecord?id=CVE-2022-42335 [1] https://www.openwall.com/lists/oss-security/2023/04/25/1 [2] https://xenbits.xen.org/xsa/advisory-430.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore
Debian Bug Tracking System
2023-May-18 20:51 UTC
[Pkg-xen-devel] Bug#1034842: marked as done (xen: CVE-2022-42335 (XSA-430))
Your message dated Thu, 18 May 2023 20:46:41 +0000 with message-id <E1pzkWH-005P7S-FP at fasolo.debian.org> and subject line Bug#1034842: fixed in xen 4.17.1+2-gb773c48e36-1 has caused the Debian Bug report #1034842, regarding xen: CVE-2022-42335 (XSA-430) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1034842: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034842 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso <carnil at debian.org> Subject: xen: CVE-2022-42335 (XSA-430) Date: Tue, 25 Apr 2023 20:55:58 +0200 Size: 2775 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20230518/d5435229/attachment.eml> -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters <ftpmaster at ftp-master.debian.org> Subject: Bug#1034842: fixed in xen 4.17.1+2-gb773c48e36-1 Date: Thu, 18 May 2023 20:46:41 +0000 Size: 6664 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20230518/d5435229/attachment-0001.eml>