Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.
References
Configurations
History
28 Nov 2022, 20:12
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5272 - Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
24 Nov 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Nov 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Nov 2022, 17:07
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-421.txt - Patch, Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/01/11 - Mailing List, Patch, Third Party Advisory | |
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-421.html - Patch, Vendor Advisory | |
CWE | CWE-401 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* |
01 Nov 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Nov 2022, 13:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-01 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-42325
Mitre link : CVE-2022-42325
CVE.ORG link : CVE-2022-42325
JSON object : View
Products Affected
debian
- debian_linux
xen
- xen
fedoraproject
- fedora
CWE
CWE-401
Missing Release of Memory after Effective Lifetime