Bug 2450243 (CVE-2026-23554) - CVE-2026-23554 xen: Xen: Information disclosure and potential privilege escalation via use-after-free in EPT paging
Summary: CVE-2026-23554 xen: Xen: Information disclosure and potential privilege escal...
Keywords:
Status: NEW
Alias: CVE-2026-23554
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2450273
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-23 08:01 UTC by OSIDB Bzimport
Modified: 2026-03-23 09:37 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-23 08:01:45 UTC
The Intel EPT paging code uses an optimization to defer flushing of any cached
EPT state until the p2m lock is dropped, so that multiple modifications done
under the same locked region only issue a single flush.

Freeing of paging structures however is not deferred until the flushing is
done, and can result in freed pages transiently being present in cached state.
Such stale entries can point to memory ranges not owned by the guest, thus
allowing access to unintended memory regions.


Note You need to log in before you can comment on or make changes to this bug.