CVE-2022-33746
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.
| Vendor | xen |
| Product | xen |
| Published | Oct 11, 2022 |
| Last Updated | Aug 3, 2024 |
Stay Ahead of the Next One
Get instant alerts for xen xen
Be the first to know when new unknown vulnerabilities affecting xen xen are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Xen / xen
All versions affected References
xenbits.xenproject.org: https://xenbits.xenproject.org/xsa/advisory-410.txt xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-410.html openwall.com: http://www.openwall.com/lists/oss-security/2022/10/11/3 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/ debian.org: https://www.debian.org/security/2022/dsa-5272 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ security.gentoo.org: https://security.gentoo.org/glsa/202402-07
Credits
{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Julien Grall of Amazon.'}]}}}