x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory | 
| http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
| https://security.gentoo.org/glsa/202402-07 | |
| https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2023/04/25/1 | Mailing List Third Party Advisory | 
| http://xenbits.xen.org/xsa/advisory-430.html | Patch Vendor Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ | |
| https://security.gentoo.org/glsa/202402-07 | |
| https://xenbits.xenproject.org/xsa/advisory-430.txt | Patch Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2023/04/25/1 - Mailing List, Third Party Advisory | |
| References | () http://xenbits.xen.org/xsa/advisory-430.html - Patch, Vendor Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ - | |
| References | () https://security.gentoo.org/glsa/202402-07 - | |
| References | () https://xenbits.xenproject.org/xsa/advisory-430.txt - Patch, Vendor Advisory | 
04 Feb 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
07 Nov 2023, 03:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
        
        
  | 
04 May 2023, 17:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MLIST) http://www.openwall.com/lists/oss-security/2023/04/25/1 - Mailing List, Third Party Advisory | |
| References | (MISC) https://xenbits.xenproject.org/xsa/advisory-430.txt - Patch, Vendor Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/ - Mailing List, Third Party Advisory | |
| References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-430.html - Patch, Vendor Advisory | |
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:*  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| First Time | 
        
        Xen xen
         Fedoraproject Xen Fedoraproject fedora  | 
28 Apr 2023, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
25 Apr 2023, 15:57
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
25 Apr 2023, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-25 13:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-42335
Mitre link : CVE-2022-42335
CVE.ORG link : CVE-2022-42335
JSON object : View
Products Affected
                fedoraproject
- fedora
 
xen
- xen
 
CWE
                
                    
                        
                        CWE-476
                        
            NULL Pointer Dereference
