First published: Wed Dec 07 2022(Updated: )
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.0 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42329 is classified as a high severity vulnerability due to the potential for deadlock in the Linux netback driver.
To resolve CVE-2022-42329, ensure that you update to the recommended versions of the Linux kernel, specifically 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2022-42329 affects various versions of the Linux kernel and Debian Linux, notably including versions up to 6.0 and Debian 10.0.
CVE-2022-42329 is a deadlock vulnerability that can occur in the netback driver of the Linux kernel.
Yes, CVE-2022-42329 can be exploited remotely by guests triggering the deadlock when interacting with the Linux netback driver.