Xen

Xen

19 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 14.02.2025 21:15:15
  • Zuletzt bearbeitet 26.04.2025 20:15:31

For a brief summary of Xapi terminology, see: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contains functionality to backup and restore metadata about Virtual Machines and Storage Repositories (SRs). The meta...

  • EPSS 0.03%
  • Veröffentlicht 19.12.2024 21:15:08
  • Zuletzt bearbeitet 09.01.2025 17:15:12

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

  • EPSS 0.04%
  • Veröffentlicht 19.12.2024 12:15:16
  • Zuletzt bearbeitet 31.12.2024 19:15:46

PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess sp...

  • EPSS 0.06%
  • Veröffentlicht 19.12.2024 12:15:16
  • Zuletzt bearbeitet 20.05.2025 16:28:07

The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it...

  • EPSS 0.44%
  • Veröffentlicht 25.09.2024 11:15:12
  • Zuletzt bearbeitet 21.11.2024 09:38:08

In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrup...

  • EPSS 0.13%
  • Veröffentlicht 18.07.2024 14:15:04
  • Zuletzt bearbeitet 26.04.2025 20:15:31

An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path coul...

  • EPSS 13.59%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 27.03.2025 21:15:48

Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details,...

  • EPSS 6.5%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 30.04.2025 23:15:59

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set t...

  • EPSS 0.02%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 21.11.2024 08:29:24

Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 12.05.2025 15:06:58

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...