This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
History

Wed, 27 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate

cvssV3_1

{'score': 0.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N'}

threat_severity

None


Tue, 22 Oct 2024 01:30:00 +0000

Type Values Removed Values Added
Title kernel: xen: use correct end address of kernel for conflict checking
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Mon, 21 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen: use correct end address of kernel for conflict checking When running as a Xen PV dom0 the kernel is loaded by the hypervisor using a different memory map than that of the host. In order to minimize the required changes in the kernel, the kernel adapts its memory map to that of the host. In order to do that it is checking for conflicts of its load address with the host memory map. Unfortunately the tested memory range does not include the .brk area, which might result in crashes or memory corruption when this area does conflict with the memory map of the host. Fix the test by using the _end label instead of __bss_stop. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title xen: use correct end address of kernel for conflict checking
References

Mon, 21 Oct 2024 12:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen: use correct end address of kernel for conflict checking When running as a Xen PV dom0 the kernel is loaded by the hypervisor using a different memory map than that of the host. In order to minimize the required changes in the kernel, the kernel adapts its memory map to that of the host. In order to do that it is checking for conflicts of its load address with the host memory map. Unfortunately the tested memory range does not include the .brk area, which might result in crashes or memory corruption when this area does conflict with the memory map of the host. Fix the test by using the _end label instead of __bss_stop.
Title xen: use correct end address of kernel for conflict checking
References

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2024-10-21T12:58:26.199Z

Reserved: 2024-09-30T16:00:12.950Z

Link: CVE-2024-47722

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2024-10-21T13:15:02.360

Modified: 2024-10-21T13:15:02.360

Link: CVE-2024-47722

cve-icon Redhat

Severity :

Publid Date: 2024-10-21T00:00:00Z

Links: CVE-2024-47722 - Bugzilla

cve-icon OpenCVE Enrichment

No data.