CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
27.7%
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
debian | debian_linux | 10.0 | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
[
{
"vendor": "Linux",
"product": "Linux",
"versions": [
{
"version": "consult Xen advisory XSA-424",
"status": "unknown"
}
]
}
]
www.openwall.com/lists/oss-security/2022/12/08/2
www.openwall.com/lists/oss-security/2022/12/08/3
www.openwall.com/lists/oss-security/2022/12/09/2
lists.debian.org/debian-lts-announce/2022/12/msg00031.html
lists.debian.org/debian-lts-announce/2022/12/msg00034.html
xenbits.xenproject.org/xsa/advisory-424.txt