{"api_version":"1","generated_at":"2026-04-22T23:53:04+00:00","cve":"CVE-2022-33744","urls":{"html":"https://cve.report/CVE-2022-33744","api":"https://cve.report/api/cve/CVE-2022-33744.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-33744","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-33744"},"summary":{"title":"CVE-2022-33744","description":"Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.","state":"PUBLIC","assigner":"security@xen.org","published_at":"2022-07-05 13:15:00","updated_at":"2022-10-29 02:50:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"http://xenbits.xen.org/xsa/advisory-406.html","name":"http://xenbits.xen.org/xsa/advisory-406.html","refsource":"CONFIRM","tags":[],"title":"XSA-406 - Xen Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/07/05/4","name":"[oss-security] 20220705 Xen Security Advisory 406 v3 (CVE-2022-33744) - Arm guests can cause Dom0 DoS via PV devices","refsource":"MLIST","tags":[],"title":"oss-security - Xen Security Advisory 406 v3 (CVE-2022-33744) - Arm guests can\n cause Dom0 DoS via PV devices","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html","name":"[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3131-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5191","name":"DSA-5191","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5191-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://xenbits.xenproject.org/xsa/advisory-406.txt","name":"https://xenbits.xenproject.org/xsa/advisory-406.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-33744","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33744","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Array","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"33744","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33744","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33744","vulnerable":"1","versionEndIncluding":"5.18","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-33744","qid":"180900","title":"Debian Security Update for linux (DSA 5191-1)"},{"cve":"CVE-2022-33744","qid":"181091","title":"Debian Security Update for linux (DLA 3131-1)"},{"cve":"CVE-2022-33744","qid":"183821","title":"Debian Security Update for linux (CVE-2022-33744)"},{"cve":"CVE-2022-33744","qid":"198948","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5624-1)"},{"cve":"CVE-2022-33744","qid":"198950","title":"Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-5623-1)"},{"cve":"CVE-2022-33744","qid":"198953","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5633-1)"},{"cve":"CVE-2022-33744","qid":"198958","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5635-1)"},{"cve":"CVE-2022-33744","qid":"198960","title":"Ubuntu Security Notification for Linux kernel (Oracle) Vulnerabilities (USN-5640-1)"},{"cve":"CVE-2022-33744","qid":"198964","title":"Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5644-1)"},{"cve":"CVE-2022-33744","qid":"198967","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5648-1)"},{"cve":"CVE-2022-33744","qid":"198972","title":"Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-5655-1)"},{"cve":"CVE-2022-33744","qid":"198978","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5669-1)"},{"cve":"CVE-2022-33744","qid":"198980","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5668-1)"},{"cve":"CVE-2022-33744","qid":"198985","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5678-1)"},{"cve":"CVE-2022-33744","qid":"198987","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5677-1)"},{"cve":"CVE-2022-33744","qid":"198989","title":"Ubuntu Security Notification for Linux kernel (IBM) Vulnerabilities (USN-5683-1)"},{"cve":"CVE-2022-33744","qid":"198990","title":"Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-5682-1)"},{"cve":"CVE-2022-33744","qid":"198994","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5687-1)"},{"cve":"CVE-2022-33744","qid":"199011","title":"Ubuntu Security Notification for Linux kernel (Azure CVM) Vulnerabilities (USN-5706-1)"},{"cve":"CVE-2022-33744","qid":"354002","title":"Amazon Linux Security Advisory for kernel : ALAS2-2022-1825"},{"cve":"CVE-2022-33744","qid":"354016","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-018"},{"cve":"CVE-2022-33744","qid":"354025","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-033"},{"cve":"CVE-2022-33744","qid":"354030","title":"Amazon Linux Security Advisory for kernel : ALAS-2022-1624"},{"cve":"CVE-2022-33744","qid":"377117","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0158)"},{"cve":"CVE-2022-33744","qid":"378043","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0011)"},{"cve":"CVE-2022-33744","qid":"502600","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33744","qid":"503695","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33744","qid":"6140072","title":"AWS Bottlerocket Security Update for kernel (GHSA-vvf7-ccjw-7682)"},{"cve":"CVE-2022-33744","qid":"672139","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-2428)"},{"cve":"CVE-2022-33744","qid":"672158","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-2415)"},{"cve":"CVE-2022-33744","qid":"902475","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10133)"},{"cve":"CVE-2022-33744","qid":"902508","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10130)"},{"cve":"CVE-2022-33744","qid":"904137","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10108-1)"},{"cve":"CVE-2022-33744","qid":"904197","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10121-1)"},{"cve":"CVE-2022-33744","qid":"905849","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10121-2)"},{"cve":"CVE-2022-33744","qid":"906413","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10108-2)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@xen.org","ID":"CVE-2022-33744","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Linux","version":{"version_data":[{"version_affected":"?","version_value":"consult Xen advisory XSA-406"}]}}]},"vendor_name":"Linux"}]}},"configuration":{"configuration_data":{"description":{"description_data":[{"lang":"eng","value":"Only Arm systems (32-bit and 64-bit) are vulnerable. Dom0 Linux versions\n3.13 - 5.18 are vulnerable.\n\nX86 systems are not vulnerable."}]}}},"credit":{"credit_data":{"description":{"description_data":[{"lang":"eng","value":"This issue was discovered by Oleksandr Tyshchenko of EPAM."}]}}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages."}]},"impact":{"impact_data":{"description":{"description_data":[{"lang":"eng","value":"A guest performing multiple I/Os of PV devices in parallel can cause\nDoS of dom0 and thus of the complete host."}]}}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"unknown"}]}]},"references":{"reference_data":[{"url":"https://xenbits.xenproject.org/xsa/advisory-406.txt","refsource":"MISC","name":"https://xenbits.xenproject.org/xsa/advisory-406.txt"},{"refsource":"CONFIRM","name":"http://xenbits.xen.org/xsa/advisory-406.html","url":"http://xenbits.xen.org/xsa/advisory-406.html"},{"refsource":"MLIST","name":"[oss-security] 20220705 Xen Security Advisory 406 v3 (CVE-2022-33744) - Arm guests can cause Dom0 DoS via PV devices","url":"http://www.openwall.com/lists/oss-security/2022/07/05/4"},{"refsource":"DEBIAN","name":"DSA-5191","url":"https://www.debian.org/security/2022/dsa-5191"},{"refsource":"MLIST","name":"[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"}]},"workaround":{"workaround_data":{"description":{"description_data":[{"lang":"eng","value":"There is no mitigation available."}]}}}},"nvd":{"publishedDate":"2022-07-05 13:15:00","lastModifiedDate":"2022-10-29 02:50:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":4.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":1,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:N/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.13","versionEndIncluding":"5.18","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}