6.5 CVE-2022-42321

Patch
 

Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored.
https://nvd.nist.gov/vuln/detail/CVE-2022-42321

Categories

CWE-674 : Uncontrolled Recursion
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Ensure an end condition will be reached under all logic conditions. The end condition may include testing against the depth of recursion and exiting with an error if the recursion goes too deep. The complexity of the end condition contributes to the effectiveness of this action. Increase the stack size. Deeply nested arrays trigger stack exhaustion. Self-referencing pointers create infinite loop and resultant stack exhaustion. Javascript application accidentally changes input in a way that prevents a recursive call from detecting an exit condition. An attempt to recover a corrupted XML file infinite recursion protection counter was not always incremented missing the exit condition. USB-audio driver's descriptor code parsing allows unlimited recursion leading to stack exhaustion.

References

CONFIRM Patch

DEBIAN

DSA-5272
Third Party Advisory

FEDORA

FEDORA-2022-07438e12df
Mailing List Third Party Advisory
FEDORA-2022-99af00f60e
Mailing List Third Party Advisory
FEDORA-2022-9f51d13fa3
Mailing List Third Party Advisory

MISC Patch

_MLIST


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
http://xenbits.xen.org/xsa/advisory-418.html
https://xenbits.xenproject.org/xsa/advisory-418.txt


EXPLOITS


Exploit-db.com

id description date
No known exploits

Other (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
230 Serialized Data with Nested Payloads
High
231 Oversized Serialized Data Payloads
High


MITRE