๐Ÿ” CVE Alert

CVE-2022-33747

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

Vendor xen
Product xen
Published Oct 11, 2022
Last Updated Aug 3, 2024
Stay Ahead of the Next One

Get instant alerts for xen xen

Be the first to know when new unknown vulnerabilities affecting xen xen are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Xen / xen
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
xenbits.xenproject.org: https://xenbits.xenproject.org/xsa/advisory-409.txt xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-409.html openwall.com: http://www.openwall.com/lists/oss-security/2022/10/11/5 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/ debian.org: https://www.debian.org/security/2022/dsa-5272 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ security.gentoo.org: https://security.gentoo.org/glsa/202402-07