Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.
References
Configurations
History
04 Feb 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
29 Nov 2022, 18:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ - Mailing List, Third Party Advisory |
24 Nov 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Nov 2022, 19:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Debian debian Linux Fedoraproject Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5272 - Third Party Advisory |
17 Nov 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Nov 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Nov 2022, 17:12
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://xenbits.xen.org/xsa/advisory-421.html - Patch, Vendor Advisory | |
References | (MISC) https://xenbits.xenproject.org/xsa/advisory-421.txt - Patch, Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/01/11 - Mailing List, Patch, Third Party Advisory | |
CWE | CWE-401 | |
CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | |
First Time |
Xen
Xen xen |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
01 Nov 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-01 13:15
Updated : 2024-02-04 08:15
NVD link : CVE-2022-42326
Mitre link : CVE-2022-42326
CVE.ORG link : CVE-2022-42326
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
xen
- xen
CWE
CWE-401
Missing Release of Memory after Effective Lifetime