CVE-2022-26361
📋 TL;DR
This vulnerability affects systems using Intel VT-d or AMD-Vi IOMMU technologies where PCI devices have Reserved Memory Regions (RMRR) or Unity Mapping ranges. When these memory mappings become inaccessible to devices after activation, subsequent DMA operations or interrupts can cause unpredictable behavior ranging from IOMMU faults to memory corruption. This primarily affects virtualization platforms like Xen and Linux systems with specific hardware configurations.
💻 Affected Systems
- Xen Hypervisor
- Linux kernel with IOMMU support
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Xen by Xen
⚠️ Risk & Real-World Impact
Worst Case
Memory corruption leading to system crashes, data loss, or potential privilege escalation through DMA attacks.
Likely Case
System instability, IOMMU faults causing device failures, or system crashes requiring reboots.
If Mitigated
Limited to specific hardware configurations with RMRR/Unity Mapping devices; proper patching prevents exploitation.
🎯 Exploit Status
Exploitation requires specific hardware configuration and understanding of IOMMU/RMRR mechanisms. No public exploits known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Xen XSA-400 patch; Linux kernel patches from 2022
Vendor Advisory: http://xenbits.xen.org/xsa/advisory-400.html
Restart Required: Yes
Instructions:
1. Update Xen to version with XSA-400 patch. 2. Update Linux kernel to version with IOMMU fixes from 2022. 3. Reboot system after patching.
🔧 Temporary Workarounds
Disable affected IOMMU features
allDisable Intel VT-d or AMD-Vi IOMMU in BIOS/UEFI settings if not required
Remove RMRR/Unity Mapping devices
linuxIdentify and remove PCI devices using RMRR/Unity Mapping features
lspci -v | grep -i rmrr
dmesg | grep -i unity
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users
- Monitor for IOMMU fault messages in system logs and investigate any anomalies
🔍 How to Verify
Check if Vulnerable:
Check Xen version for XSA-400 patch or Linux kernel version for 2022 IOMMU fixes
Check Version:
xenversion -v (Xen) or uname -r (Linux)
Verify Fix Applied:
Verify Xen version includes XSA-400 or kernel includes IOMMU fixes; check dmesg for IOMMU-related errors
📡 Detection & Monitoring
Log Indicators:
- IOMMU fault messages in dmesg/kernel logs
- System crashes related to DMA operations
- PCI device errors
Network Indicators:
- None - local hardware vulnerability
SIEM Query:
Search for 'IOMMU fault', 'RMRR error', or 'DMA failure' in system logs
🔗 References
- http://www.openwall.com/lists/oss-security/2022/04/05/3
- http://xenbits.xen.org/xsa/advisory-400.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/
- https://security.gentoo.org/glsa/202402-07
- https://www.debian.org/security/2022/dsa-5117
- https://xenbits.xenproject.org/xsa/advisory-400.txt
- http://www.openwall.com/lists/oss-security/2022/04/05/3
- http://xenbits.xen.org/xsa/advisory-400.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ETPM2OVZZ6KOS2L7QO7SIW6XWT5OW3F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHFSRVLM2JUCPDC2KGB7ETPQYJLCGBLD/
- https://security.gentoo.org/glsa/202402-07
- https://www.debian.org/security/2022/dsa-5117
- https://xenbits.xenproject.org/xsa/advisory-400.txt