Xen

Xen

476 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 01.11.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 07:24:44

Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is norma...

  • EPSS 0.02%
  • Veröffentlicht 01.11.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 07:24:44

Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xen...

  • EPSS 0.03%
  • Veröffentlicht 01.11.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 07:24:44

Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a ...

  • EPSS 0.03%
  • Veröffentlicht 01.11.2022 13:15:11
  • Zuletzt bearbeitet 21.11.2024 07:24:45

Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a ...

  • EPSS 0.03%
  • Veröffentlicht 11.10.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 07:08:27

P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking ...

  • EPSS 0.02%
  • Veröffentlicht 11.10.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 07:08:27

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal oper...

  • EPSS 0.03%
  • Veröffentlicht 11.10.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 07:08:27

lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each...

  • EPSS 0.05%
  • Veröffentlicht 26.07.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 07:08:27

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code ...

  • EPSS 1.41%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:55

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • EPSS 0.08%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:56

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve ...