Количество 14
Количество 14
GHSA-xxpf-x8mq-p6v4
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVE-2022-42316
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction

CVE-2022-42316
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
CVE-2022-42316
Xenstore: guests can let run xenstored out of memory T[his CNA informa ...

BDU:2024-03584
Уязвимость хранилища информации Xenstore гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2022:4332-1
Security update for xen

SUSE-SU-2022:4051-1
Security update for xen

SUSE-SU-2022:3960-1
Security update for xen

SUSE-SU-2022:4241-1
Security update for xen

SUSE-SU-2022:3971-1
Security update for xen

SUSE-SU-2022:3947-1
Security update for xen

SUSE-SU-2022:3925-1
Security update for xen

SUSE-SU-2022:4007-1
Security update for xen

SUSE-SU-2022:3928-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-xxpf-x8mq-p6v4 Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction | CVSS3: 6.5 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2022-42316 Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-42316 Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
CVE-2022-42316 Xenstore: guests can let run xenstored out of memory T[his CNA informa ... | CVSS3: 6.5 | 0% Низкий | почти 3 года назад | |
![]() | BDU:2024-03584 Уязвимость хранилища информации Xenstore гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
![]() | SUSE-SU-2022:4332-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4051-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3960-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4241-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3971-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3947-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3925-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4007-1 Security update for xen | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3928-1 Security update for xen | больше 2 лет назад |
Уязвимостей на страницу