Description
The adjustments made for XSA-379 as well as those subsequently becoming
XSA-387 still left a race window, when a HVM or PVH guest does a grant
table version change from v2 to v1 in parallel with mapping the status
page(s) via XENMEM_add_to_physmap. Some of the status pages may then be
freed while mappings of them would still be inserted into the guest's
secondary (P2M) page tables.
Published: 2026-05-19
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw arises when a HVM or PVH guest changes the grant table version from v2 to v1 while it simultaneously maps status pages via XENMEM_add_to_physmap. This overlap can cause some mapped status pages to be freed prematurely while still referenced in the guest's P2M page tables, leading to a use‑after‑free that corrupts host memory. The CVE description does not state that this leads to remote code execution, but the data identifies a memory corruption threat at the hypervisor level.

Affected Systems

Xen hypervisor installations that have applied the XSA‑379 or XSA‑387 mitigations but have not fully closed the race window are affected. Because the CVE does not list specific version ranges, the risk applies to any Xen system hosting HVM or PVH guests that remain vulnerable to the grant table race condition.

Risk and Exploitability

The CVSS score of 7.8 classifies the issue as high severity. The EPSS score is not available and the vulnerability is not listed in CISA KEV, indicating no known active exploitation at the time of analysis. A feasible exploit would require the ability to control a HVM or PVH guest and trigger concurrent grant‑table changes and status page mappings, which is typically a local or privileged attack scenario. The severity rating and memory‑corruption nature imply that a successful attack could compromise host integrity, though explicit remote code execution was not described in the official CVE text.

Generated by OpenCVE AI on May 19, 2026 at 17:22 UTC.

Remediation

Vendor Workaround

Using the "gnttab=max-ver:1" hypervisor command line option will avoid the vulnerability. Using the "max_grant_version=1" guest configuration option for HVM and PVH guests will also avoid the vulnerability.


OpenCVE Recommended Actions

  • Add the hypervisor command line option "gnttab=max-ver:1" to avoid the vulnerability.
  • Configure each HVM or PVH guest with the option "max_grant_version=1" so that the guest never requests grant table version 2.
  • Keep Xen hypervisor up to date and apply any future releases that remove the race window or provide a verified fix.

Generated by OpenCVE AI on May 19, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Xen
Xen xen
Vendors & Products Xen
Xen xen

Tue, 19 May 2026 14:30:00 +0000


Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description The adjustments made for XSA-379 as well as those subsequently becoming XSA-387 still left a race window, when a HVM or PVH guest does a grant table version change from v2 to v1 in parallel with mapping the status page(s) via XENMEM_add_to_physmap. Some of the status pages may then be freed while mappings of them would still be inserted into the guest's secondary (P2M) page tables.
Title grant table v2 race in status page mapping
References

cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2026-05-20T03:55:35.327Z

Reserved: 2026-01-14T13:07:36.961Z

Link: CVE-2026-23558

cve-icon Vulnrichment

Updated: 2026-05-19T13:06:51.044Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-19T14:16:38.960

Modified: 2026-05-19T18:55:19.793

Link: CVE-2026-23558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T17:30:10Z

Weaknesses