First published: Tue Nov 01 2022(Updated: )
x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | =4.16 | |
Red Hat Fedora | =36 | |
Red Hat Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-42327.
The severity of CVE-2022-42327 is high, with a severity value of 7.1.
Xen Xen version 4.16, Fedora 36, and Fedora 37 are affected by CVE-2022-42327.
A guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode on Intel systems that support the "virtualize APIC accesses" feature.
To fix the unintended memory sharing between guests, it is recommended to apply the necessary updates provided by the respective vendors.