Description
x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.
Published: 2022-06-09
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5184-1 xen security update
EUVD EUVD EUVD-2022-30921 x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2024-08-03T05:03:32.792Z

Reserved: 2022-03-02T00:00:00.000Z

Link: CVE-2022-26362

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-09T17:15:08.957

Modified: 2024-11-21T06:53:49.957

Link: CVE-2022-26362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses