CVE-2022-42335 — NULL Pointer Dereference in XEN
Severity
7.8HIGHNVD
EPSS
0.1%
top 77.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Description
x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Fedora 38
Patches
🔴Vulnerability Details
2OSV▶
CVE-2022-42335: x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP↗2023-04-25
GHSA▶
GHSA-pwx9-2gvj-242v: x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP↗2023-04-25
📋Vendor Advisories
1Debian▶
CVE-2022-42335: xen - x86 shadow paging arbitrary pointer dereference In environments where host assis...↗2022