First published: Wed Dec 07 2022(Updated: )
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.0 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42328 has been classified with a moderate severity level due to the potential for triggering deadlocks in the Linux netback driver.
To fix CVE-2022-42328, users should upgrade to the specified patched versions of the Linux kernel that mitigate this vulnerability.
CVE-2022-42328 affects various versions of the Linux kernel, including those used in Debian Linux 10.0 and prior versions up to 6.0.
The impact of CVE-2022-42328 allows guests to induce a deadlock condition when freeing packet SKB, potentially leading to a denial of service.
Yes, CVE-2022-42328 has been identified in multiple Linux distributions, notably in the Debian Linux environment.