Логотип exploitDog
bind:CVE-2022-33747
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-33747

Количество 6

Количество 6

ubuntu логотип

CVE-2022-33747

больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2022-33747

больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2022-33747

больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain ac ...

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-wp5g-757j-v342

больше 3 лет назад

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3947-1

около 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4007-1

около 3 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-33747

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-33747

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-33747

Arm: unbounded memory consumption for 2nd-level page tables Certain ac ...

CVSS3: 3.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-wp5g-757j-v342

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.

CVSS3: 3.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3947-1

Security update for xen

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4007-1

Security update for xen

около 3 лет назад

Уязвимостей на страницу