First published: Tue Nov 01 2022(Updated: )
Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored.
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Xen Xen | ||
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-42321 is medium.
Guests can crash xenstored by exhausting the stack through recursion, specifically when deleting a sub-tree of Xenstore nodes.
Versions 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, and 4.17.2+55-g0b56bed864-1 are affected by CVE-2022-42321.
Debian Xen, Xen Xen, Debian Debian Linux, Fedoraproject Fedora 35, Fedoraproject Fedora 36, and Fedoraproject Fedora 37 are affected by CVE-2022-42321.
To fix CVE-2022-42321, update your Xen software to versions 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2+55-g0b56bed864-1.