Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-42313
HistoryNov 01, 2022 - 1:15 p.m.

CVE-2022-42313

2022-11-0113:15:00
Debian Security Bug Tracker
security-tracker.debian.org
9

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian11allxen< 4.14.5+86-g1c354767d5-1xen_4.14.5+86-g1c354767d5-1_all.deb
Debian10allxen<= 4.11.4+107-gef32c7afa2-1xen_4.11.4+107-gef32c7afa2-1_all.deb
Debian999allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian13allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%