Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-26362

Опубликовано: 09 июн. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9
CVSS3: 6.4

Описание

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/bionic

needs-triage

esm-infra/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
impish

ignored

end of life

Показывать по

EPSS

Процентиль: 15%
0.00047
Низкий

6.9 Medium

CVSS2

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
nvd
больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
debian
больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type ref ...

CVSS3: 6.4
github
больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.7
fstec
больше 3 лет назад

Уязвимость гипервизора Xen, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 3 лет назад

Security update for xen

EPSS

Процентиль: 15%
0.00047
Низкий

6.9 Medium

CVSS2

6.4 Medium

CVSS3