Xen

Xen

476 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Published 23.09.2020 21:15:12
  • Last modified 21.11.2024 05:18:11

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strict...

  • EPSS 0.16%
  • Published 20.07.2020 19:15:11
  • Last modified 21.11.2024 05:06:18

An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes ...

  • EPSS 0.08%
  • Published 07.07.2020 13:15:10
  • Last modified 21.11.2024 05:05:44

An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared ...

  • EPSS 0.08%
  • Published 07.07.2020 13:15:10
  • Last modified 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and C...

  • EPSS 0.06%
  • Published 07.07.2020 13:15:10
  • Last modified 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is a...

  • EPSS 0.06%
  • Published 07.07.2020 13:15:10
  • Last modified 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circum...

  • EPSS 0.08%
  • Published 07.07.2020 13:15:09
  • Last modified 21.11.2024 05:05:44

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to p...

  • EPSS 0.09%
  • Published 14.04.2020 13:15:12
  • Last modified 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier....

  • EPSS 0.11%
  • Published 14.04.2020 13:15:12
  • Last modified 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been ...

  • EPSS 0.11%
  • Published 14.04.2020 13:15:12
  • Last modified 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profi...