CVE-2021-28699
- EPSS 0.07%
- Veröffentlicht 27.08.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:00:10
inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the add...
CVE-2021-28700
- EPSS 2.13%
- Veröffentlicht 27.08.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:00:10
xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond wh...
CVE-2021-28692
- EPSS 0.04%
- Veröffentlicht 30.06.2021 11:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:09
inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such ...
CVE-2021-28693
- EPSS 0.06%
- Veröffentlicht 30.06.2021 11:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:09
xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub...
CVE-2021-28690
- EPSS 0.36%
- Veröffentlicht 29.06.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:09
x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default an...
CVE-2021-28687
- EPSS 0.05%
- Veröffentlicht 11.06.2021 15:15:11
- Zuletzt bearbeitet 21.11.2024 06:00:08
HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this ini...
CVE-2021-28689
- EPSS 0.08%
- Veröffentlicht 11.06.2021 15:15:11
- Zuletzt bearbeitet 21.11.2024 06:00:08
x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement...
CVE-2021-26313
- EPSS 0.08%
- Veröffentlicht 09.06.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 05:56:04
Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
CVE-2021-26314
- EPSS 0.1%
- Veröffentlicht 09.06.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 05:56:04
Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result...
CVE-2021-28039
- EPSS 0.14%
- Veröffentlicht 05.03.2021 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:59:01
An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest...