cvelist/2022/33xxx/CVE-2022-33747.json
2022-11-17 03:00:34 +00:00

129 lines
4.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@xen.org",
"ID": "CVE-2022-33747",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "xen",
"version": {
"version_data": [
{
"version_affected": "?",
"version_value": "consult Xen advisory XSA-409"
}
]
}
}
]
},
"vendor_name": "Xen"
}
]
}
},
"configuration": {
"configuration_data": {
"description": {
"description_data": [
{
"lang": "eng",
"value": "All versions of Xen are affected.\n\nOnly Arm systems are vulnerable. x86 systems are not vulnerable."
}
]
}
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings."
}
]
},
"impact": {
"impact_data": {
"description": {
"description_data": [
{
"lang": "eng",
"value": "A malicious guest could cause a Denial of Service, preventing any system\noperation requiring further allocation of Xen memory, including creating\nnew guests. NB however that memory exhaustion by itself shouldn\u2019t cause\neither Xen or properly-written guests to crash."
}
]
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "unknown"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-409.txt",
"refsource": "MISC",
"name": "https://xenbits.xenproject.org/xsa/advisory-409.txt"
},
{
"refsource": "CONFIRM",
"name": "http://xenbits.xen.org/xsa/advisory-409.html",
"url": "http://xenbits.xen.org/xsa/advisory-409.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20221011 Xen Security Advisory 409 v3 (CVE-2022-33747) - Arm: unbounded memory consumption for 2nd-level page tables",
"url": "http://www.openwall.com/lists/oss-security/2022/10/11/5"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-5b594b82ac",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/"
},
{
"refsource": "DEBIAN",
"name": "DSA-5272",
"url": "https://www.debian.org/security/2022/dsa-5272"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d80cc73088",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-99af00f60e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"
}
]
},
"workaround": {
"workaround_data": {
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is no known mitigation."
}
]
}
}
}
}