Xen

Xen

485 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Veröffentlicht 23.03.2026 06:57:07
  • Zuletzt bearbeitet 23.03.2026 08:16:17

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing asse...

  • EPSS -
  • Veröffentlicht 23.03.2026 06:56:52
  • Zuletzt bearbeitet 23.03.2026 08:16:16

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however ...

  • EPSS 0.03%
  • Veröffentlicht 28.01.2026 15:33:44
  • Zuletzt bearbeitet 09.02.2026 18:46:17

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks...

  • EPSS 0.02%
  • Veröffentlicht 28.01.2026 15:33:17
  • Zuletzt bearbeitet 09.02.2026 19:13:28

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding o...

  • EPSS 0.03%
  • Veröffentlicht 31.10.2025 11:50:39
  • Zuletzt bearbeitet 14.01.2026 22:04:31

When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the...

  • EPSS 0.02%
  • Veröffentlicht 31.10.2025 11:50:28
  • Zuletzt bearbeitet 14.01.2026 22:03:18

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking...

  • EPSS 0.02%
  • Veröffentlicht 31.10.2025 11:50:28
  • Zuletzt bearbeitet 14.01.2026 22:03:32

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking...

  • EPSS 0.06%
  • Veröffentlicht 11.09.2025 14:05:36
  • Zuletzt bearbeitet 04.11.2025 22:16:32

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are two issues related to the mapping of pages belonging to other domains: For one, an assertion is wrong there, w...

  • EPSS 0.04%
  • Veröffentlicht 11.09.2025 14:05:36
  • Zuletzt bearbeitet 04.11.2025 22:16:32

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are two issues related to the mapping of pages belonging to other domains: For one, an assertion is wrong there, w...

  • EPSS 0.03%
  • Veröffentlicht 11.09.2025 14:05:29
  • Zuletzt bearbeitet 04.11.2025 22:16:08

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL ...