Bug 2156215 (CVE-2022-42328, CVE-2022-42329)

Summary: CVE-2022-42328 CVE-2022-42329 kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
Product: [Other] Security Response Reporter: Alex <allarkin>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, adscvr, airlied, alciregi, bhu, bskeggs, chwhite, crwood, ddepaula, debarbos, dfreiber, dhoward, dvlasenk, ezulian, fhrbata, hdegoede, hkrzesin, hpa, jarod, jarodwilson, jburrell, jfaracco, jferlan, jforbes, jglisse, jlelli, joe.lawrence, josef, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, lleshchi, lzampier, masami256, mchehab, nmurray, ptalbert, qzhao, rogbas, rvrbovsk, scweaver, steved, tyberry, vkumar, walters, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A possible deadlock flaw was found in the Linux kernel’s XEN driver in how some packets generated by a user dropped. This flaw allows a local user to crash the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-26 09:01:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2156216    
Bug Blocks: 2152134    

Description Alex 2022-12-25 14:53:46 UTC
A flaw in the Linux Kernel XEN found (emulated network device driver). When trying to free the SKB of a packet dropped, the deadlock can happen (CVE-2022-42328).
Additionally when dropping packets for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
A malicious guest could cause Denial of Service (DoS) of the host via the paravirtualized network interface.

References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netback/interface.c?h=v6.1&id=74e7e1efdad45580cc3839f2a155174cf158f9b5
https://www.openwall.com/lists/oss-security/2022/12/08/2
https://www.openwall.com/lists/oss-security/2022/12/08/3
https://www.openwall.com/lists/oss-security/2022/12/09/2

Comment 1 Alex 2022-12-25 14:54:09 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2156216]

Comment 3 Product Security DevOps Team 2022-12-26 09:00:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-42328
https://access.redhat.com/security/cve/cve-2022-42329

Comment 4 Justin M. Forbes 2022-12-31 15:46:20 UTC
This was fixed for Fedora with the 6.0.13 stable kernel release