6.5 CVE-2022-42321
Patch
Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored.
https://nvd.nist.gov/vuln/detail/CVE-2022-42321
Categories
CWE-674 : Uncontrolled Recursion
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack. Ensure an end condition will be reached under all logic conditions. The end condition may include testing against the depth of recursion and exiting with an error if the recursion goes too deep. The complexity of the end condition contributes to the effectiveness of this action. Increase the stack size. Deeply nested arrays trigger stack exhaustion. Self-referencing pointers create infinite loop and resultant stack exhaustion. Javascript application accidentally changes input in a way that prevents a recursive call from detecting an exit condition. An attempt to recover a corrupted XML file infinite recursion protection counter was not always incremented missing the exit condition. USB-audio driver's descriptor code parsing allows unlimited recursion leading to stack exhaustion.
References
CONFIRM Patch
http://xenbits.xen.org/xsa/advisory-418.html Patch Vendor Advisory |
DEBIAN
DSA-5272 Third Party Advisory |
FEDORA
FEDORA-2022-07438e12df Mailing List Third Party Advisory |
FEDORA-2022-99af00f60e Mailing List Third Party Advisory |
FEDORA-2022-9f51d13fa3 Mailing List Third Party Advisory |
MISC Patch
https://xenbits.xenproject.org/xsa/advisory-418.txt Patch Vendor Advisory |
_MLIST
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
Patch
Url |
---|
http://xenbits.xen.org/xsa/advisory-418.html |
https://xenbits.xenproject.org/xsa/advisory-418.txt |
Exploits
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
No known exploits |
CAPEC
id | description | severity |
---|---|---|
230 | Serialized Data with Nested Payloads |
High |
231 | Oversized Serialized Data Payloads |
High |
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
