Логотип exploitDog
bind:"BDU:2024-03584" OR bind:"CVE-2022-42316"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-03584" OR bind:"CVE-2022-42316"

Количество 14

Количество 14

fstec логотип

BDU:2024-03584

почти 3 года назад

Уязвимость хранилища информации Xenstore гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2022-42316

почти 3 года назад

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2022-42316

почти 3 года назад

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-42316

почти 3 года назад

Xenstore: guests can let run xenstored out of memory T[his CNA informa ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-xxpf-x8mq-p6v4

почти 3 года назад

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4332-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4051-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3960-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4241-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3971-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3947-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3925-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4007-1

больше 2 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3928-1

больше 2 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-03584

Уязвимость хранилища информации Xenstore гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-42316

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-42316

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-42316

Xenstore: guests can let run xenstored out of memory T[his CNA informa ...

CVSS3: 6.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-xxpf-x8mq-p6v4

Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVSS3: 6.5
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4332-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4051-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3960-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4241-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3971-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3947-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3925-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4007-1

Security update for xen

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3928-1

Security update for xen

больше 2 лет назад

Уязвимостей на страницу