Xen

Xen

476 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 01.11.2022 13:15:11
  • Last modified 21.11.2024 07:24:44

Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is norma...

  • EPSS 0.02%
  • Published 01.11.2022 13:15:11
  • Last modified 21.11.2024 07:24:44

Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xen...

  • EPSS 0.03%
  • Published 01.11.2022 13:15:11
  • Last modified 21.11.2024 07:24:44

Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a ...

  • EPSS 0.03%
  • Published 01.11.2022 13:15:11
  • Last modified 21.11.2024 07:24:45

Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a ...

  • EPSS 0.03%
  • Published 11.10.2022 13:15:10
  • Last modified 21.11.2024 07:08:27

P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking ...

  • EPSS 0.02%
  • Published 11.10.2022 13:15:10
  • Last modified 21.11.2024 07:08:27

Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal oper...

  • EPSS 0.03%
  • Published 11.10.2022 13:15:10
  • Last modified 21.11.2024 07:08:27

lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each...

  • EPSS 0.05%
  • Published 26.07.2022 13:15:10
  • Last modified 21.11.2024 07:08:27

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code ...

  • EPSS 1.41%
  • Published 12.07.2022 19:15:08
  • Last modified 21.11.2024 06:59:55

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • EPSS 0.08%
  • Published 12.07.2022 19:15:08
  • Last modified 21.11.2024 06:59:56

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve ...