CVE-2026-23558 PUBLISHED

grant table v2 race in status page mapping

Assigner: XEN
Reserved: 14.01.2026 Published: 19.05.2026 Updated: 19.05.2026

The adjustments made for XSA-379 as well as those subsequently becoming XSA-387 still left a race window, when a HVM or PVH guest does a grant table version change from v2 to v1 in parallel with mapping the status page(s) via XENMEM_add_to_physmap. Some of the status pages may then be freed while mappings of them would still be inserted into the guest's secondary (P2M) page tables.

Product Status

Vendor Xen
Product Xen
Versions Default: unknown
  • Version consult Xen advisory XSA-486 is unknown

Affected Configurations

All Xen versions from 4.0 onwards are affected. Xen versions 3.4 and older are not affected.

Only x86 HVM and PVH guests permitted to use grant table version 2 interfaces can leverage this vulnerability. x86 PV guests cannot leverage this vulnerability. On Arm, grant table v2 use is explicitly unsupported.

Workarounds

Using the "gnttab=max-ver:1" hypervisor command line option will avoid the vulnerability.

Using the "max_grant_version=1" guest configuration option for HVM and PVH guests will also avoid the vulnerability.

Credits

  • This issue was discovered by Claude Opus 4.6 and diagnosed as a security issue by Rafal Wojtczuk. finder

References

Impacts

  • Privilege escalation, information leaks, and Denial of Service (DoS) up to affecting the entire host cannot be excluded.