First published: Tue Jan 25 2022(Updated: )
Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Xen xen-unstable | >=4.6.0 | |
Fedora | =34 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23035 has a medium severity rating due to insufficient cleanup of IRQs that can lead to system instability.
To fix CVE-2022-23035, upgrade to the patched versions of Xen as specified in the advisory for your Linux distribution.
CVE-2022-23035 affects various versions of the Xen hypervisor, particularly those prior to 4.14.6-1 and including versions 4.11.4+107-gef32c7afa2-1.
CVE-2022-23035 is not directly exploitable remotely; it requires local access to the affected virtual machines.
The implications of CVE-2022-23035 in virtualized environments include potential data corruption and increased system downtime due to IRQ mismanagement.