CVE-2022-48969

Source
https://cve.org/CVERecord?id=CVE-2022-48969
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48969.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48969
Downstream
Related
Published
2024-10-21T20:05:51.051Z
Modified
2026-03-12T03:24:22.543850Z
Summary
xen-netfront: Fix NULL sring after live migration
Details

In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Fix NULL sring after live migration

A NAPI is setup for each network sring to poll data to kernel The sring with source host is destroyed before live migration and new sring with target host is setup after live migration. The NAPI for the old sring is not deleted until setup new sring with target host after migration. With busypoll/busyread enabled, the NAPI can be polled before got deleted when resume VM.

BUG: unable to handle kernel NULL pointer dereference at 0000000000000008 IP: xennetpoll+0xae/0xd20 PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI Call Trace: finishtaskswitch+0x71/0x230 timerqueuedel+0x1d/0x40 hrtimertrytocancel+0xb5/0x110 xennetallocrxbuffers+0x2a0/0x2a0 napibusyloop+0xdb/0x270 sockpoll+0x87/0x90 dosyspoll+0x26f/0x580 tracingmapinsert+0x1d4/0x2f0 eventhist_trigger+0x14a/0x260

finishtaskswitch+0x71/0x230 __schedule+0x256/0x890 recalcsigpending+0x1b/0x50 xensched_clock+0x15/0x20 __rbreservenext+0x12d/0x140 ringbufferlockreserve+0x123/0x3d0 eventtriggerscall+0x87/0xb0 traceeventbuffercommit+0x1c4/0x210 xenclocksourcegetcycles+0x15/0x20 ktimegetts64+0x51/0xf0 SySppoll+0x160/0x1a0 SySppoll+0x160/0x1a0 dosyscall64+0x73/0x130 entrySYSCALL64afterhwframe+0x41/0xa6 ... RIP: xennetpoll+0xae/0xd20 RSP: ffffb4f041933900 CR2: 0000000000000008 ---[ end trace f8601785b354351c ]---

xen frontend should remove the NAPIs for the old srings before live migration as the bond srings are destroyed

There is a tiny window between the srings are set to NULL and the NAPIs are disabled, It is safe as the NAPI threads are still frozen at that time

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48969.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4ec2411980d0fd2995e8dea8a06fe57aa47523cb
Fixed
99859947517e446058ad7243ee81d2f9801fa3dd
Fixed
ed773dd798bf720756d20021b8d8a4a3d7184bda
Fixed
e6860c889f4ad50b6ab696f5ea154295d72cf27a
Fixed
e6e897d4fe2f89c0bd94600a40bedf5e6e75e050
Fixed
f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84
Fixed
d50b7914fae04d840ce36491d22133070b18cca9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48969.json"