x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
https://security.gentoo.org/glsa/202402-07 | |
https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
https://security.gentoo.org/glsa/202402-07 | |
https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/04/25/1 - Mailing List, Third Party Advisory | |
References | () http://xenbits.xen.org/xsa/advisory-430.html - Patch, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ - | |
References | () https://security.gentoo.org/glsa/202402-07 - | |
References | () https://xenbits.xenproject.org/xsa/advisory-430.txt - Patch, Vendor Advisory |
04 Feb 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-04-25 13:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-42335
Mitre link : CVE-2022-42335
CVE.ORG link : CVE-2022-42335
JSON object : View
Products Affected
fedoraproject
- fedora
xen
- xen
CWE
CWE-476
NULL Pointer Dereference