CVE-2022-26357

Name
CVE-2022-26357
Description
race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://xenbits.xenproject.org/xsa/advisory-399.txt
CONFIRM http://xenbits.xen.org/xsa/advisory-399.html
MLIST http://www.openwall.com/lists/oss-security/2022/04/05/2
DEBIAN https://www.debian.org/security/2022/dsa-5117
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/
security@xen.org https://security.gentoo.org/glsa/202402-07

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* xen >= 4.11.0 < 4.12.0
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* xen >= 4.13.0 < 4.16.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen 3.12-main 4.13.4-r3 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.13-main 4.14.5-r7 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.14-main 4.15.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.15-main 4.15.5-r4 Natanael Copa <ncopa@alpinelinux.org> fixed