Bug 2156215 (CVE-2022-42328, CVE-2022-42329) - CVE-2022-42328 CVE-2022-42329 kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
Summary: CVE-2022-42328 CVE-2022-42329 kernel: Xen Security Advisory 424 v1: guests ca...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-42328, CVE-2022-42329
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2156216
Blocks: 2152134
TreeView+ depends on / blocked
 
Reported: 2022-12-25 14:53 UTC by Alex
Modified: 2023-01-04 15:40 UTC (History)
52 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A possible deadlock flaw was found in the Linux kernel’s XEN driver in how some packets generated by a user dropped. This flaw allows a local user to crash the system.
Clone Of:
Environment:
Last Closed: 2022-12-26 09:01:01 UTC
Embargoed:


Attachments (Terms of Use)

Description Alex 2022-12-25 14:53:46 UTC
A flaw in the Linux Kernel XEN found (emulated network device driver). When trying to free the SKB of a packet dropped, the deadlock can happen (CVE-2022-42328).
Additionally when dropping packets for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
A malicious guest could cause Denial of Service (DoS) of the host via the paravirtualized network interface.

References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netback/interface.c?h=v6.1&id=74e7e1efdad45580cc3839f2a155174cf158f9b5
https://www.openwall.com/lists/oss-security/2022/12/08/2
https://www.openwall.com/lists/oss-security/2022/12/08/3
https://www.openwall.com/lists/oss-security/2022/12/09/2

Comment 1 Alex 2022-12-25 14:54:09 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2156216]

Comment 3 Product Security DevOps Team 2022-12-26 09:00:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-42328
https://access.redhat.com/security/cve/cve-2022-42329

Comment 4 Justin M. Forbes 2022-12-31 15:46:20 UTC
This was fixed for Fedora with the 6.0.13 stable kernel release


Note You need to log in before you can comment on or make changes to this bug.