CVE-2024-45819
- EPSS 0.04%
- Published 19.12.2024 12:15:16
- Last modified 31.12.2024 19:15:46
PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess sp...
CVE-2024-45817
- EPSS 0.44%
- Published 25.09.2024 11:15:12
- Last modified 21.11.2024 09:38:08
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrup...
CVE-2024-31143
- EPSS 0.13%
- Published 18.07.2024 14:15:04
- Last modified 26.04.2025 20:15:31
An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path coul...
CVE-2023-46842
- EPSS 6.5%
- Published 16.05.2024 14:15:08
- Last modified 30.04.2025 23:15:59
Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set t...
CVE-2024-31142
- EPSS 13.59%
- Published 16.05.2024 14:15:08
- Last modified 27.03.2025 21:15:48
Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details,...
CVE-2023-46839
- EPSS 0.07%
- Published 20.03.2024 11:15:08
- Last modified 21.11.2024 20:15:36
PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding reques...
CVE-2023-46840
- EPSS 0.02%
- Published 20.03.2024 11:15:08
- Last modified 21.11.2024 08:29:24
Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.
CVE-2023-46841
- EPSS 0.07%
- Published 20.03.2024 11:15:08
- Last modified 12.05.2025 15:06:58
Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...
CVE-2024-2193
- EPSS 1.75%
- Published 15.03.2024 18:15:08
- Last modified 30.04.2025 23:16:01
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...
CVE-2023-46835
- EPSS 0.08%
- Published 05.01.2024 17:15:11
- Last modified 17.06.2025 16:15:23
The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-...