7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
13.4%
race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d
hardware may allow for only less than 15 bits to hold a domain ID
associating a physical device with a particular domain. Therefore
internally Xen domain IDs are mapped to the smaller value range. The
cleaning up of the housekeeping structures has a race, allowing for VT-d
domain IDs to be leaked and flushes to be bypassed.
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |
www.openwall.com/lists/oss-security/2022/04/05/2
xenbits.xen.org/xsa/advisory-399.html
launchpad.net/bugs/cve/CVE-2022-26357
nvd.nist.gov/vuln/detail/CVE-2022-26357
security-tracker.debian.org/tracker/CVE-2022-26357
www.cve.org/CVERecord?id=CVE-2022-26357
xenbits.xen.org/xsa/advisory-399.html
xenbits.xenproject.org/xsa/advisory-399.txt
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
13.4%