3.8
CVSSv3

CVE-2022-33747

Published: 11/10/2022 Updated: 04/02/2024
CVSS v3 Base Score: 3.8 | Impact Score: 1.4 | Exploitability Score: 2
VMScore: 0

Vulnerability Summary

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1021668 xen: CVE-2022-33749 CVE-2022-33748 CVE-2022-33747 CVE-2022-33746 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 12 Oct 2022 17:39:02 UTC Severity: important Tags: securit ...
Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in privilege escalation, denial of service or information leaks For the stable distribution (bullseye), these problems have been fixed in version 4145+86-g1c354767d5-1 We recommend that you upgrade your xen packages For the detailed security status of xen p ...