Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-33747

Опубликовано: 11 окт. 2022
Источник: nvd
CVSS3: 3.8
EPSS Низкий

Описание

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:xen:xen:*:*:*:*:*:*:arm:*
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 7%
0.00026
Низкий

3.8 Low

CVSS3

Дефекты

CWE-404

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
debian
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain ac ...

CVSS3: 3.8
github
больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

suse-cvrf
около 3 лет назад

Security update for xen

suse-cvrf
около 3 лет назад

Security update for xen

EPSS

Процентиль: 7%
0.00026
Низкий

3.8 Low

CVSS3

Дефекты

CWE-404