Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 11.06.2021 15:15:11
  • Zuletzt bearbeitet 21.11.2024 06:00:08

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement...

  • EPSS 0.08%
  • Veröffentlicht 09.06.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:04

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 09.06.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:04

Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result...

  • EPSS 0.14%
  • Veröffentlicht 05.03.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:59:01

An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest...

  • EPSS 0.07%
  • Veröffentlicht 18.02.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:52

An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush...

  • EPSS 0.08%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in Xen 4.9 through 4.14.x. On Arm, a guest is allowed to control whether memory accesses are bypassing the cache. This means that Xen needs to ensure that all writes (such as the ones during scrubbing) have reached the memory ...

  • EPSS 0.06%
  • Veröffentlicht 26.01.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 06:21:15

An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and en...

  • EPSS 0.06%
  • Veröffentlicht 15.12.2020 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created...

  • EPSS 0.07%
  • Veröffentlicht 15.12.2020 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid wil...

  • EPSS 0.06%
  • Veröffentlicht 15.12.2020 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must acce...