vulnerability
Arch Linux: Improper Locking (CVE-2022-42329)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Dec 7, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Dec 7, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Solution
arch-linux-upgrade-latest
References
- CVE-2022-42329
- https://attackerkb.com/topics/CVE-2022-42329
- URL-http://www.openwall.com/lists/oss-security/2022/12/08/2
- URL-http://www.openwall.com/lists/oss-security/2022/12/08/3
- URL-http://www.openwall.com/lists/oss-security/2022/12/09/2
- URL-https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
- URL-https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
- URL-https://xenbits.xenproject.org/xsa/advisory-424.txt
- CWE-667
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.