#VU63310 Race condition


Published: 2022-05-17

Vulnerability identifier: #VU63310

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-23041

CWE-ID: CWE-362

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Xen
Server applications / Virtualization software

Vendor: Xen Project

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls ring buffers. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Xen: All versions


CPE

External links
http://xenbits.xenproject.org/xsa/advisory-396.txt


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability