First published: Tue Oct 11 2022(Updated: )
lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU.
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Xen Xen | >=4.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33748 is a vulnerability related to lock order inversion in transitive grant copy handling in Xen.
The severity of CVE-2022-33748 is medium with a CVSS score of 5.6.
CVE-2022-33748 affects Xen versions 4.0 and above.
To fix the CVE-2022-33748 vulnerability in Xen, users are advised to update to the fixed versions mentioned in the advisories.
More information about CVE-2022-33748 can be found in the provided references.