Xenstore: Guests can crash xenstored Due to a bug in the fix of XSA-115 a malicious guest can cause xenstored to use a wrong pointer during node creation in an error path, resulting in a crash of xenstored or a memory corruption in xenstored causing further damage. Entering the error path can be controlled by the guest e.g. by exceeding the quota value of maximum nodes per domain.
References
Link | Resource |
---|---|
https://xenbits.xenproject.org/xsa/advisory-414.txt | Patch Vendor Advisory |
http://xenbits.xen.org/xsa/advisory-414.html | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/11/01/4 | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5272 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | Mailing List Third Party Advisory |
Information
Published : 2022-11-01 06:15
Updated : 2022-11-29 10:08
NVD link : CVE-2022-42309
Mitre link : CVE-2022-42309
JSON object : View
CWE
CWE-763
Release of Invalid Pointer or Reference
Products Affected
debian
- debian_linux
xen
- xen
fedoraproject
- fedora