xen is vulnerable to denial of service (DoS) attacks. P2M pool freeing may take excessively long te P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks resulting in an application crash.
www.openwall.com/lists/oss-security/2022/10/11/3
xenbits.xen.org/xsa/advisory-410.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
lists.fedoraproject.org/archives/list/[email protected]/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/
lists.fedoraproject.org/archives/list/[email protected]/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/
lists.fedoraproject.org/archives/list/[email protected]/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
www.debian.org/security/2022/dsa-5272
xenbits.xenproject.org/xsa/advisory-410.txt