{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-26359","assignerOrgId":"23aa2041-22e1-471f-9209-9b7396fa234f","assignerShortName":"XEN","dateUpdated":"2024-08-03T05:03:32.395Z","dateReserved":"2022-03-02T00:00:00.000Z","datePublished":"2022-04-05T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"23aa2041-22e1-471f-9209-9b7396fa234f","shortName":"XEN","dateUpdated":"2024-02-04T08:07:24.754Z"},"descriptions":[{"lang":"en","value":"IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption."}],"affected":[{"vendor":"Xen","product":"xen","versions":[{"version":"consult Xen advisory XSA-400","status":"unknown"}]}],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-400.txt"},{"url":"http://xenbits.xen.org/xsa/advisory-400.html"},{"name":"[oss-security] 20220405 Xen Security Advisory 400 v2 (CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361) - IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/04/05/3"},{"name":"DSA-5117","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5117"},{"name":"FEDORA-2022-dfbf7e2372","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/"},{"name":"FEDORA-2022-64b2c02d29","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/"},{"name":"GLSA-202402-07","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202402-07"}],"credits":[{"lang":"en","value":"{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'Aspects of this issue were discovered by Jan Beulich of SUSE and\\nRoger Pau Monné of Citrix.'}]}}}"}],"metrics":[{"other":{"type":"unknown","content":{"description":{"description_data":[{"lang":"eng","value":"The precise impact is system specific, but would likely be a Denial of\nService (DoS) affecting the entire host.  Privilege escalation and\ninformation leaks cannot be ruled out."}]}}}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"unknown"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T05:03:32.395Z"},"title":"CVE Program Container","references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-400.txt","tags":["x_transferred"]},{"url":"http://xenbits.xen.org/xsa/advisory-400.html","tags":["x_transferred"]},{"name":"[oss-security] 20220405 Xen Security Advisory 400 v2 (CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361) - IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/04/05/3"},{"name":"DSA-5117","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5117"},{"name":"FEDORA-2022-dfbf7e2372","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/"},{"name":"FEDORA-2022-64b2c02d29","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/"},{"name":"GLSA-202402-07","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202402-07"}]}]}}