CVE-2022-26356 — Improper Locking in XEN
Severity
5.6MEDIUMNVD
EPSS
0.0%
top 85.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 5
Latest updateApr 6
Description
Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive lock…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 1.1 | Impact: 4.0
Affected Packages3 packages
Also affects: Debian Linux 11.0, Fedora 34, 35
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-wqf3-h5g7-w9q8: Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was name↗2022-04-06
OSV▶
CVE-2022-26356: Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was name↗2022-04-05
📋Vendor Advisories
1Debian▶
CVE-2022-26356: xen - Racy interactions between dirty vram tracking and paging log dirty hypercalls Ac...↗2022