Логотип exploitDog
bind:CVE-2022-42335
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-42335

Количество 5

Количество 5

ubuntu логотип

CVE-2022-42335

почти 3 года назад

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2022-42335

почти 3 года назад

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-42335

почти 3 года назад

x86 shadow paging arbitrary pointer dereference In environments where ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-pwx9-2gvj-242v

почти 3 года назад

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2535-1

больше 2 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-42335

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-42335

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-42335

x86 shadow paging arbitrary pointer dereference In environments where ...

CVSS3: 7.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-pwx9-2gvj-242v

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2535-1

Security update for xen

больше 2 лет назад

Уязвимостей на страницу