Bug 2450243 (CVE-2026-23554)
| Summary: | CVE-2026-23554 xen: Xen: Information disclosure and potential privilege escalation via use-after-free in EPT paging | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in Xen. An optimization in the Intel Extended Page Table (EPT) paging code, used by Xen, defers flushing cached EPT state. However, the freeing of paging structures is not similarly deferred. This can result in freed memory pages remaining in the cached state, allowing stale entries to point to memory regions not intended for guest access. A malicious guest could potentially exploit this to access unintended memory regions, leading to information disclosure or privilege escalation.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2450273 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-03-23 08:01:45 UTC
|