x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
https://security.gentoo.org/glsa/202402-07 | |
https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory |
Configurations
History
04 May 2023, 17:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-476 | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-430.html - Patch, Vendor Advisory | |
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-430.txt - Patch, Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2023/04/25/1 - Mailing List, Third Party Advisory |
28 Apr 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 15:57
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-25 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-42335
Mitre link : CVE-2022-42335
CVE.ORG link : CVE-2022-42335
JSON object : View
Products Affected
fedoraproject
- fedora
xen
- xen
CWE
CWE-476
NULL Pointer Dereference