{"api_version":"1","generated_at":"2026-04-22T23:53:12+00:00","cve":"CVE-2022-33748","urls":{"html":"https://cve.report/CVE-2022-33748","api":"https://cve.report/api/cve/CVE-2022-33748.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-33748","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-33748"},"summary":{"title":"CVE-2022-33748","description":"lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU.","state":"PUBLIC","assigner":"security@xen.org","published_at":"2022-10-11 13:15:00","updated_at":"2024-02-04 08:15:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/","name":"FEDORA-2022-5b594b82ac","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: xen-4.16.2-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://xenbits.xenproject.org/xsa/advisory-411.txt","name":"https://xenbits.xenproject.org/xsa/advisory-411.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/","name":"FEDORA-2022-d80cc73088","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: xen-4.16.2-2.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202402-07","name":"GLSA-202402-07","refsource":"","tags":[],"title":"Xen: Multiple Vulnerabilities (GLSA 202402-07) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://xenbits.xen.org/xsa/advisory-411.html","name":"http://xenbits.xen.org/xsa/advisory-411.html","refsource":"CONFIRM","tags":[],"title":"XSA-411 - Xen Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5272","name":"DSA-5272","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5272-1 xen","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/10/11/2","name":"[oss-security] 20221011 Xen Security Advisory 411 v3 (CVE-2022-33748) - lock order inversion in transitive grant copy handling","refsource":"MLIST","tags":[],"title":"oss-security - Xen Security Advisory 411 v3 (CVE-2022-33748) - lock order\n inversion in transitive grant copy handling","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/","name":"FEDORA-2022-5b594b82ac","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: xen-4.16.2-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/","name":"FEDORA-2022-d80cc73088","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: xen-4.16.2-2.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","name":"FEDORA-2022-99af00f60e","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: xen-4.15.3-7.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","name":"FEDORA-2022-99af00f60e","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: xen-4.15.3-7.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-33748","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33748","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Array","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"33748","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33748","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33748","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33748","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33748","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-33748","qid":"181193","title":"Debian Security Update for xen (DSA 5272-1)"},{"cve":"CVE-2022-33748","qid":"182696","title":"Debian Security Update for xen (CVE-2022-33748)"},{"cve":"CVE-2022-33748","qid":"283267","title":"Fedora Security Update for xen (FEDORA-2022-5b594b82ac)"},{"cve":"CVE-2022-33748","qid":"283319","title":"Fedora Security Update for xen (FEDORA-2022-99af00f60e)"},{"cve":"CVE-2022-33748","qid":"283476","title":"Fedora Security Update for xen (FEDORA-2022-d80cc73088)"},{"cve":"CVE-2022-33748","qid":"502600","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"502619","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"503143","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"503695","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"504549","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"505964","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2022-33748","qid":"710858","title":"Gentoo Linux Xen Multiple Vulnerabilities (GLSA 202402-07)"},{"cve":"CVE-2022-33748","qid":"752684","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3665-1)"},{"cve":"CVE-2022-33748","qid":"752715","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3727-1)"},{"cve":"CVE-2022-33748","qid":"752719","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3728-1)"},{"cve":"CVE-2022-33748","qid":"752778","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3925-1)"},{"cve":"CVE-2022-33748","qid":"752781","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3928-1)"},{"cve":"CVE-2022-33748","qid":"752792","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3947-1)"},{"cve":"CVE-2022-33748","qid":"752796","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:3971-1)"},{"cve":"CVE-2022-33748","qid":"752807","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:4007-1)"},{"cve":"CVE-2022-33748","qid":"752887","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2022:4241-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@xen.org","ID":"CVE-2022-33748","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"xen","version":{"version_data":[{"version_affected":"?","version_value":"consult Xen advisory XSA-411"}]}}]},"vendor_name":"Xen"}]}},"configuration":{"configuration_data":{"description":{"description_data":[{"lang":"eng","value":"Xen versions 4.0 and newer are vulnerable.  Xen versions 3.4 and older\nare not vulnerable.\n\nOnly guests with access to transitive grants can exploit the\nvulnerability.  In particular, this means that:\n\n * ARM systems which have taken the XSA-268 fix are not vulnerable, as\n   Grant Table v2 was disabled for other security reasons.\n\n * All systems with the XSA-226 fixes, and booted with\n   `gnttab=max-ver:1` or `gnttab=no-transitive` are not vulnerable.\n\n * From Xen 4.16, the maximum grant table version can be controlled on a\n   per-domain basis.  For the xl toolstack, the vulnerability does not\n   manifest if either:\n\n   1) Every guest has `max_grant_version=1` in their configuration file,\n      or\n\n   2) The global xl.conf has `max_grant_version=1`, and no guests have\n      the default overridden by selecting `max_grant_version=2`.\n\nOnly multiple cooperating guests can exploit the vulnerability."}]}}},"credit":{"credit_data":{"description":{"description_data":[{"lang":"eng","value":"This issue was discovered by Jan Beulich of SUSE."}]}}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU."}]},"impact":{"impact_data":{"description":{"description_data":[{"lang":"eng","value":"Malicious or buggy guest kernels may be able to mount a Denial of\nService (DoS) attack affecting the entire system."}]}}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"unknown"}]}]},"references":{"reference_data":[{"url":"https://xenbits.xenproject.org/xsa/advisory-411.txt","refsource":"MISC","name":"https://xenbits.xenproject.org/xsa/advisory-411.txt"},{"refsource":"CONFIRM","name":"http://xenbits.xen.org/xsa/advisory-411.html","url":"http://xenbits.xen.org/xsa/advisory-411.html"},{"refsource":"MLIST","name":"[oss-security] 20221011 Xen Security Advisory 411 v3 (CVE-2022-33748) - lock order inversion in transitive grant copy handling","url":"http://www.openwall.com/lists/oss-security/2022/10/11/2"},{"refsource":"FEDORA","name":"FEDORA-2022-5b594b82ac","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/"},{"refsource":"DEBIAN","name":"DSA-5272","url":"https://www.debian.org/security/2022/dsa-5272"},{"refsource":"FEDORA","name":"FEDORA-2022-d80cc73088","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/"},{"refsource":"FEDORA","name":"FEDORA-2022-99af00f60e","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"}]},"workaround":{"workaround_data":{"description":{"description_data":[{"lang":"eng","value":"Disallowing the use of transitive grants either via the\n`gnttab=no-transitive` Xen command line option, or by disabling grant\ninterface version 2 altogether via the `gnttab=max-ver:1` Xen command\nline option or the xl controls as mentioned above will avoid the\nvulnerability."}]}}}},"nvd":{"publishedDate":"2022-10-11 13:15:00","lastModifiedDate":"2024-02-04 08:15:00","problem_types":["CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.6,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.1,"impactScore":4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}