CVE-2022-23035Incomplete Cleanup in XEN

CWE-459Incomplete Cleanup5 documents5 sources
Severity
4.6MEDIUMNVD
EPSS
0.1%
top 69.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25
Latest updateJan 26

Description

Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 0.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/xen< xen 4.16.0+51-g0941d6cb-1 (bookworm)
Debianxen/xen< 4.14.4+74-gd7b22226b5-1+3
NVDxen/xen

Also affects: Debian Linux 11.0, Fedora 34

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5x5q-fcw5-7frv: Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an itera2022-01-26
OSV
CVE-2022-23035: Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an itera2022-01-25

📋Vendor Advisories

2
Red Hat
xen: Insufficient cleanup of passed-through device IRQs (XSA-395)2022-01-25
Debian
CVE-2022-23035: xen - Insufficient cleanup of passed-through device IRQs The management of IRQs associ...2022