x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
References
Link | Resource |
---|---|
https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory |
http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
https://security.gentoo.org/glsa/202402-07 |
Configurations
History
04 Feb 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
04 May 2023, 17:35
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-430.txt - Patch, Vendor Advisory | |
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-430.html - Patch, Vendor Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2023/04/25/1 - Mailing List, Third Party Advisory | |
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:* |
|
First Time |
Fedoraproject
Xen xen Fedoraproject fedora Xen |
28 Apr 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 15:57
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-25 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-42335
Mitre link : CVE-2022-42335
JSON object : View
Products Affected
xen
- xen
fedoraproject
- fedora
CWE
CWE-476
NULL Pointer Dereference