CVE-2022-23035

Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Aug 2022, 09:59

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202208-23 - (GENTOO) https://security.gentoo.org/glsa/202208-23 - Third Party Advisory

15 Aug 2022, 11:18

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-23 -

29 Jul 2022, 19:01

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2022/dsa-5117 - (DEBIAN) https://www.debian.org/security/2022/dsa-5117 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

19 Apr 2022, 12:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5117 -

25 Mar 2022, 14:25

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/ - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/25/4 - (MLIST) http://www.openwall.com/lists/oss-security/2022/01/25/4 - Mailing List, Patch, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

19 Feb 2022, 03:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/01/25/4 -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/ -

01 Feb 2022, 15:45

Type Values Removed Values Added
CWE CWE-459
CVSS v2 : unknown
v3 : unknown
v2 : 4.7
v3 : 4.6
References (MISC) https://xenbits.xenproject.org/xsa/advisory-395.txt - (MISC) https://xenbits.xenproject.org/xsa/advisory-395.txt - Vendor Advisory
CPE cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*

25 Jan 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-25 14:15

Updated : 2024-02-04 22:08


NVD link : CVE-2022-23035

Mitre link : CVE-2022-23035

CVE.ORG link : CVE-2022-23035


JSON object : View

Products Affected

xen

  • xen

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-459

Incomplete Cleanup