CVE-2020-25598
- EPSS 0.07%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:11
An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasi...
- EPSS 0.07%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:12
An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal as...
CVE-2020-25600
- EPSS 0.1%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:12
An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bi...
CVE-2020-25601
- EPSS 0.08%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:12
An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of the...
- EPSS 0.08%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:12
An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the ba...
CVE-2020-25603
- EPSS 0.07%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:12
An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is ...
CVE-2020-25604
- EPSS 0.07%
- Veröffentlicht 23.09.2020 22:15:13
- Zuletzt bearbeitet 21.11.2024 05:18:13
An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also o...
CVE-2020-25595
- EPSS 0.09%
- Veröffentlicht 23.09.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:18:11
An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strict...
CVE-2020-15852
- EPSS 0.16%
- Veröffentlicht 20.07.2020 19:15:11
- Zuletzt bearbeitet 21.11.2024 05:06:18
An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes ...
CVE-2020-15564
- EPSS 0.08%
- Veröffentlicht 07.07.2020 13:15:10
- Zuletzt bearbeitet 21.11.2024 05:05:44
An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared ...