Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 25.01.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:47:51

Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where...

  • EPSS 0.08%
  • Veröffentlicht 25.01.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:50

arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pagetable on Arm (p2m_remove_mapping, guest_physmap_remove_page, and p2m_set_entry with mfn set to INVALID_MFN) do not actually ...

  • EPSS 0.04%
  • Veröffentlicht 05.01.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:00:11

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unp...

  • EPSS 0.04%
  • Veröffentlicht 05.01.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:00:11

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unp...

  • EPSS 0.04%
  • Veröffentlicht 05.01.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:00:11

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unp...

  • EPSS 0.11%
  • Veröffentlicht 07.12.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:00:10

grant table v2 status pages may remain accessible after de-allocation (take two) Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant tab...

  • EPSS 0.12%
  • Veröffentlicht 24.11.2021 02:15:06
  • Zuletzt bearbeitet 21.11.2024 06:00:10

issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mod...

  • EPSS 0.09%
  • Veröffentlicht 24.11.2021 02:15:06
  • Zuletzt bearbeitet 21.11.2024 06:00:11

issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mod...

  • EPSS 0.09%
  • Veröffentlicht 24.11.2021 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:00:10

PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a wa...

  • EPSS 0.16%
  • Veröffentlicht 24.11.2021 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:00:11

guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calcula...