Vulnerability Description
A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | >= 3.2.0, < 4.13.0 |
| Fedoraproject | Fedora | 34 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/01/25/3Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202208-23Third Party Advisory
- https://www.debian.org/security/2022/dsa-5117Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-394.txtPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2022/01/25/3Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202208-23Third Party Advisory
- https://www.debian.org/security/2022/dsa-5117Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-394.txtPatchVendor Advisory
FAQ
What is CVE-2022-23034?
CVE-2022-23034 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can requ...
How severe is CVE-2022-23034?
CVE-2022-23034 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23034?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Fedoraproject Fedora, Debian Debian Linux.