CVE-2022-26356

Name
CVE-2022-26356
Description
Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://xenbits.xenproject.org/xsa/advisory-397.txt
CONFIRM http://xenbits.xen.org/xsa/advisory-397.html
MLIST http://www.openwall.com/lists/oss-security/2022/04/05/1
DEBIAN https://www.debian.org/security/2022/dsa-5117
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* xen >= 4.0.0 < 4.12.0
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* xen >= 4.13.0 < 4.14.0
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* xen >= 4.15.0 < 4.16.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen edge-main 4.16.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.13-main 4.14.5-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.15-main 4.15.2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.14-main 4.15.2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.12-main 4.13.4-r3 Natanael Copa <ncopa@alpinelinux.org> fixed