Xenstore: Guests can cause Xenstore to not free temporary memory When working on a request of a guest, xenstored might need to allocate quite large amounts of memory temporarily. This memory is freed only after the request has been finished completely. A request is regarded to be finished only after the guest has read the response message of the request from the ring page. Thus a guest not reading the response can cause xenstored to not free the temporary memory. This can result in memory shortages causing Denial of Service (DoS) of xenstored.
References
Configurations
History
29 Nov 2022, 18:29
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
24 Nov 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5272 - Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
09 Nov 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Nov 2022, 14:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
02 Nov 2022, 20:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/01/6 - Mailing List, Third Party Advisory | |
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-416.txt - Patch, Vendor Advisory | |
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-416.html - Patch, Vendor Advisory | |
CWE | CWE-401 | |
CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* |
01 Nov 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Nov 2022, 13:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-01 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-42319
Mitre link : CVE-2022-42319
CVE.ORG link : CVE-2022-42319
JSON object : View
Products Affected
debian
- debian_linux
xen
- xen
fedoraproject
- fedora
CWE
CWE-401
Missing Release of Memory after Effective Lifetime