First published: Thu Jun 09 2022(Updated: )
x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =11.0 | |
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26362 is a vulnerability in Xen that allows for a race condition in typeref acquisition.
CVE-2022-26362 has a severity of 6.4, which is considered medium.
Xen Xen, Fedoraproject Fedora 35 and 36, and Debian Debian Linux 11.0 are affected by CVE-2022-26362.
To fix CVE-2022-26362, update Xen to version 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2+55-g0b56bed864-1.
You can find more information about CVE-2022-26362 at the following references: [Advisory-401](https://xenbits.xen.org/xsa/advisory-401.html), [Project Zero Issue](https://bugs.chromium.org/p/project-zero/issues/detail?id=2294), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2022-26362).