Xen

Xen

476 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.12.2024 12:15:16
  • Zuletzt bearbeitet 31.12.2024 19:15:46

PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess sp...

  • EPSS 0.44%
  • Veröffentlicht 25.09.2024 11:15:12
  • Zuletzt bearbeitet 21.11.2024 09:38:08

In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrup...

  • EPSS 0.13%
  • Veröffentlicht 18.07.2024 14:15:04
  • Zuletzt bearbeitet 26.04.2025 20:15:31

An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path coul...

  • EPSS 6.5%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 30.04.2025 23:15:59

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set t...

  • EPSS 13.59%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 27.03.2025 21:15:48

Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details,...

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 21.11.2024 20:15:36

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding reques...

  • EPSS 0.02%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 21.11.2024 08:29:24

Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 12.05.2025 15:06:58

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...

  • EPSS 1.75%
  • Veröffentlicht 15.03.2024 18:15:08
  • Zuletzt bearbeitet 30.04.2025 23:16:01

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...

  • EPSS 0.08%
  • Veröffentlicht 05.01.2024 17:15:11
  • Zuletzt bearbeitet 17.06.2025 16:15:23

The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-...