High severity7.1NVD Advisory· Published Mar 23, 2026· Updated Apr 10, 2026
CVE-2026-23555
CVE-2026-23555
Description
Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path.
Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.openwall.com/lists/oss-security/2026/03/17/7nvdMailing ListPatchThird Party Advisory
- xenbits.xen.org/xsa/advisory-481.htmlnvdPatchVendor Advisory
- xenbits.xenproject.org/xsa/advisory-481.htmlnvdPatchVendor Advisory
News mentions
0No linked articles in our index yet.