P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.
References
Link | Resource |
---|---|
https://xenbits.xenproject.org/xsa/advisory-410.txt | Mitigation Patch Vendor Advisory |
http://xenbits.xen.org/xsa/advisory-410.html | Mitigation Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/10/11/3 | Mailing List Mitigation Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5272 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2022-10-11 06:15
Updated : 2022-12-07 19:36
NVD link : CVE-2022-33746
Mitre link : CVE-2022-33746
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
debian
- debian_linux
xen
- xen
fedoraproject
- fedora