Integer Underflow Affecting xen package, versions <4.16.1-r0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE320-XEN-7012469
- published 23 May 2024
- disclosed 25 Jan 2022
Introduced: 25 Jan 2022
CVE-2022-23034 Open this link in a new tabHow to fix?
Upgrade Alpine:3.20
xen
to version 4.16.1-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream xen
package and not the xen
package as distributed by Alpine
.
See How to fix?
for Alpine:3.20
relevant fixed versions and status.
A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/
- http://www.openwall.com/lists/oss-security/2022/01/25/3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMR6UBGJW6JKND7IILGQ2CU35EQPF3E3/
- https://security.gentoo.org/glsa/202208-23
- https://www.debian.org/security/2022/dsa-5117
- https://xenbits.xenproject.org/xsa/advisory-394.txt