Unrated severityNVD Advisory· Published Nov 1, 2022· Updated Aug 3, 2024
CVE-2022-42309
CVE-2022-42309
Description
Xenstore: Guests can crash xenstored Due to a bug in the fix of XSA-115 a malicious guest can cause xenstored to use a wrong pointer during node creation in an error path, resulting in a crash of xenstored or a memory corruption in xenstored causing further damage. Entering the error path can be controlled by the guest e.g. by exceeding the quota value of maximum nodes per domain.
Affected products
38- osv-coords37 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/suse/xen&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/xen&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/xen&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/xen&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 4.14.5_08-150300.3.40.1+ 36 more
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.16.2_08-150400.4.16.1
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.10.4_40-150000.3.84.1
- (no CPE)range: < 4.10.4_40-150000.3.84.1
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.16.2_08-150400.4.16.1
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.16.2_08-150400.4.16.1
- (no CPE)range: < 4.14.5_08-150300.3.40.1
- (no CPE)range: < 4.16.2_08-150400.4.16.1
- (no CPE)range: < 4.7.6_28-43.98.1
- (no CPE)range: < 4.9.4_34-3.114.1
- (no CPE)range: < 4.11.4_34-2.83.1
- (no CPE)range: < 4.12.4_30-3.82.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.11.4_34-2.83.1
- (no CPE)range: < 4.12.4_30-3.82.1
- (no CPE)range: < 4.10.4_40-150000.3.84.1
- (no CPE)range: < 4.12.4_30-150100.3.80.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.12.4_30-3.82.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.13.4_16-150200.3.65.1
- (no CPE)range: < 4.11.4_34-2.83.1
- (no CPE)range: < 4.11.4_34-2.83.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/mitrevendor-advisory
- security.gentoo.org/glsa/202402-07mitrevendor-advisory
- www.debian.org/security/2022/dsa-5272mitrevendor-advisory
- www.openwall.com/lists/oss-security/2022/11/01/4mitremailing-list
- xenbits.xen.org/xsa/advisory-414.htmlmitre
- xenbits.xenproject.org/xsa/advisory-414.txtmitre
News mentions
0No linked articles in our index yet.