xen is vulnerable to NULL Pointer Dereference. The vulnerability occurs due to improper check in one of the hypervisor routines used for shadow page handling. This could allow a guest with a PCI device to pass through to cause the hypervisor to access an arbitrary pointer partially under guest control.
www.openwall.com/lists/oss-security/2023/04/25/1
xenbits.xen.org/xsa/advisory-430.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/
lists.fedoraproject.org/archives/list/[email protected]/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.18/main.yaml
security.gentoo.org/glsa/202402-07
xenbits.xenproject.org/xsa/advisory-430.txt