xen is vulnerable to privilege escalation. An attacker is ale to retain access to those pages even after Xen started reusing them for other purposes.
www.openwall.com/lists/oss-security/2022/01/25/2
lists.fedoraproject.org/archives/list/[email protected]/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
security.gentoo.org/glsa/202208-23
www.debian.org/security/2022/dsa-5117
xenbits.xenproject.org/xsa/advisory-393.txt