SB20260428207 - Multiple vulnerabilities in Xen
Published: April 28, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Missing Release of Resource after Effective Lifetime (CVE-ID: CVE-2026-23556)
The vulnerability allows a remote user to cause a denial of service.
The vulnerability exists due to improper resource management in oxenstored quota use counts when tearing down and reusing domain IDs. A remote user can deliberately hit its quota and reboot a domain to cause a denial of service.
Only systems configured to use oxenstored are vulnerable.
2) Reachable assertion (CVE-ID: CVE-2026-23557)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to an assertion failure in xenstored when processing an XS_RESET_WATCHES command within a transaction. A remote attacker can issue a crafted XS_RESET_WATCHES command within a transaction to cause a denial of service.
Only systems using the C variant of xenstored or xenstore-stubdom built without NDEBUG are vulnerable.
3) Out-of-bounds read (CVE-ID: CVE-2026-31786)
The vulnerability allows a local user to disclose sensitive information, cause a denial of service, or escalate privileges.
The vulnerability exists due to an out-of-bounds read in the Xen-related sysfs buildid handler when reading the /sys/hypervisor/properties/buildid sysfs file. A local user can read the crafted sysfs output to disclose sensitive information, cause a denial of service, or escalate privileges.
In rare cases, the issue may also result in writing past the 4 kB sysfs buffer if no zero byte is found in adjacent data.
4) Race condition (CVE-ID: CVE-2026-23558)
The vulnerability allows a remote user to escalate privileges, disclose sensitive information, or cause a denial of service.
The vulnerability exists due to a race condition in status page mapping via XENMEM_add_to_physmap when changing the grant table version from v2 to v1 in parallel with mapping status pages. A remote user can trigger concurrent grant table version changes and status page mappings to escalate privileges, disclose sensitive information, or cause a denial of service.
Only x86 HVM and PVH guests permitted to use grant table version 2 interfaces can leverage this vulnerability.
5) Double free (CVE-ID: CVE-2026-31787)
The vulnerability allows a local privileged user to circumvent kernel lockdown restrictions.
The vulnerability exists due to double free in the Linux kernel privcmd driver when handling privcmd operations. A local privileged user can trigger a double free of kernel memory to circumvent kernel lockdown restrictions.
Only Linux PVH or HVM domains booted in secure mode are affected; PV domains and non-Linux domains are not vulnerable.
Remediation
Install update from vendor's website.