P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.
References
| Link | Resource |
|---|---|
| https://xenbits.xenproject.org/xsa/advisory-410.txt | Mitigation Patch Vendor Advisory |
| http://xenbits.xen.org/xsa/advisory-410.html | Mitigation Patch Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2022/10/11/3 | Mailing List Mitigation Patch Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/ | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5272 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2022-10-11 13:15
Updated : 2023-08-08 14:22
NVD link : CVE-2022-33746
Mitre link : CVE-2022-33746
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
xen
- xen
CWE
CWE-404
Improper Resource Shutdown or Release
