Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wp5g-757j-v342

Опубликовано: 11 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 3.8

Описание

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

EPSS

Процентиль: 7%
0.00026
Низкий

3.8 Low

CVSS3

Дефекты

CWE-400
CWE-404

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
nvd
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
debian
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain ac ...

suse-cvrf
около 3 лет назад

Security update for xen

suse-cvrf
около 3 лет назад

Security update for xen

EPSS

Процентиль: 7%
0.00026
Низкий

3.8 Low

CVSS3

Дефекты

CWE-400
CWE-404