P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/10/11/3 | Mailing List Mitigation Patch Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-410.html | Mitigation Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ | |
https://security.gentoo.org/glsa/202402-07 | |
https://www.debian.org/security/2022/dsa-5272 | Third Party Advisory |
https://xenbits.xenproject.org/xsa/advisory-410.txt | Mitigation Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-10-11 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-33746
Mitre link : CVE-2022-33746
CVE.ORG link : CVE-2022-33746
JSON object : View
Products Affected
xen
- xen
fedoraproject
- fedora
debian
- debian_linux
CWE
CWE-404
Improper Resource Shutdown or Release