CWE
459 416
Advisory Published
Updated

CVE-2022-23035: Use After Free

First published: Tue Jan 25 2022(Updated: )

Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.

Credit: security@xen.org

Affected SoftwareAffected VersionHow to fix
debian/xen<=4.11.4+107-gef32c7afa2-1
4.14.6-1
4.14.5+94-ge49571868d-1
4.17.1+2-gb773c48e36-1
4.17.2+55-g0b56bed864-1
Xen xen-unstable>=4.6.0
Fedora=34
Debian=11.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-23035?

    CVE-2022-23035 has a medium severity rating due to insufficient cleanup of IRQs that can lead to system instability.

  • How do I fix CVE-2022-23035?

    To fix CVE-2022-23035, upgrade to the patched versions of Xen as specified in the advisory for your Linux distribution.

  • What systems are affected by CVE-2022-23035?

    CVE-2022-23035 affects various versions of the Xen hypervisor, particularly those prior to 4.14.6-1 and including versions 4.11.4+107-gef32c7afa2-1.

  • Is CVE-2022-23035 exploitable remotely?

    CVE-2022-23035 is not directly exploitable remotely; it requires local access to the affected virtual machines.

  • What are the implications of CVE-2022-23035 for virtualized environments?

    The implications of CVE-2022-23035 in virtualized environments include potential data corruption and increased system downtime due to IRQ mismanagement.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203