Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:12

An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the ba...

  • EPSS 0.07%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:12

An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is ...

  • EPSS 0.07%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:13

An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also o...

  • EPSS 0.09%
  • Veröffentlicht 23.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:11

An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strict...

  • EPSS 0.16%
  • Veröffentlicht 20.07.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:18

An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes ...

  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:44

An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared ...

  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and C...

  • EPSS 0.06%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is a...

  • EPSS 0.06%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circum...

  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 13:15:09
  • Zuletzt bearbeitet 21.11.2024 05:05:44

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to p...