Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5272-1 | xen security update |
EUVD |
EUVD-2022-45390 | Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction |
Tue, 06 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2025-05-06T14:49:50.978Z
Reserved: 2022-10-03T00:00:00.000Z
Link: CVE-2022-42315
Updated: 2024-08-03T13:03:45.897Z
Status : Modified
Published: 2022-11-01T13:15:11.557
Modified: 2025-05-06T15:16:00.183
Link: CVE-2022-42315
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD