x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-45402 x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2025-05-05T19:11:37.065Z

Reserved: 2022-10-03T00:00:00.000Z

Link: CVE-2022-42327

cve-icon Vulnrichment

Updated: 2024-08-03T13:03:45.969Z

cve-icon NVD

Status : Modified

Published: 2022-11-01T13:15:12.163

Modified: 2025-05-05T20:15:18.900

Link: CVE-2022-42327

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.