Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-42315
HistoryNov 01, 2022 - 1:15 p.m.

CVE-2022-42315

2022-11-0113:15:11
Debian Security Bug Tracker
security-tracker.debian.org
12
xenstore
dos
memory allocation

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

27.5%

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian11allxen< 4.14.5+86-g1c354767d5-1xen_4.14.5+86-g1c354767d5-1_all.deb
Debian999allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb
Debian13allxen< 4.16.2+90-g0d39a6d1ae-1xen_4.16.2+90-g0d39a6d1ae-1_all.deb

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

27.5%