CVE-2024-31144
- EPSS 0.03%
- Published 14.02.2025 21:15:15
- Last modified 26.04.2025 20:15:31
For a brief summary of Xapi terminology, see: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contains functionality to backup and restore metadata about Virtual Machines and Storage Repositories (SRs). The meta...
CVE-2024-2201
- EPSS 0.03%
- Published 19.12.2024 21:15:08
- Last modified 09.01.2025 17:15:12
A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.
CVE-2024-45819
- EPSS 0.04%
- Published 19.12.2024 12:15:16
- Last modified 31.12.2024 19:15:46
PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess sp...
CVE-2024-45818
- EPSS 0.06%
- Published 19.12.2024 12:15:16
- Last modified 20.05.2025 16:28:07
The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it...
CVE-2024-45817
- EPSS 0.44%
- Published 25.09.2024 11:15:12
- Last modified 21.11.2024 09:38:08
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrup...
CVE-2024-31143
- EPSS 0.13%
- Published 18.07.2024 14:15:04
- Last modified 26.04.2025 20:15:31
An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path coul...
CVE-2024-31142
- EPSS 13.59%
- Published 16.05.2024 14:15:08
- Last modified 27.03.2025 21:15:48
Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details,...
CVE-2023-46842
- EPSS 6.5%
- Published 16.05.2024 14:15:08
- Last modified 30.04.2025 23:15:59
Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set t...
CVE-2023-46840
- EPSS 0.02%
- Published 20.03.2024 11:15:08
- Last modified 21.11.2024 08:29:24
Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.
CVE-2023-46841
- EPSS 0.07%
- Published 20.03.2024 11:15:08
- Last modified 12.05.2025 15:06:58
Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...