7.8
CVSSv3

CVE-2022-42335

Published: 25/04/2023 Updated: 04/02/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.17.0

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1036298 xen: CVE-2022-42336: XSA-431: Mishandling of guest SSBD selection on AMD hardware Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 18 May 2023 20:12:02 UTC Severity: g ...
Debian Bug report logs - #1034842 xen: CVE-2022-42335 (XSA-430) Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 25 Apr 2023 18:57:07 UTC Severity: grave Tags: security, upstream Found in version xen/ ...