Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.42%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 05.01.2026 19:05:51

Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set t...

  • EPSS 3.12%
  • Veröffentlicht 16.05.2024 14:15:08
  • Zuletzt bearbeitet 05.01.2026 19:00:27

Because of a logical error in XSA-407 (Branch Type Confusion), the mitigation is not applied properly when it is intended to be used. XSA-434 (Speculative Return Stack Overflow) uses the same infrastructure, so is equally impacted. For more details,...

  • EPSS 0.26%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 13.01.2026 15:03:22

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding reques...

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 13.01.2026 14:50:49

Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 04.11.2025 19:16:05

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...

  • EPSS 1.2%
  • Veröffentlicht 15.03.2024 18:15:08
  • Zuletzt bearbeitet 30.04.2025 23:16:01

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...

  • EPSS 0.09%
  • Veröffentlicht 05.01.2024 17:15:11
  • Zuletzt bearbeitet 04.11.2025 20:17:10

The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-...

  • EPSS 0.02%
  • Veröffentlicht 05.01.2024 17:15:11
  • Zuletzt bearbeitet 04.11.2025 20:17:10

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPT...

  • EPSS 0.08%
  • Veröffentlicht 05.01.2024 17:15:11
  • Zuletzt bearbeitet 04.11.2025 19:16:04

Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a...

  • EPSS 0.06%
  • Veröffentlicht 05.01.2024 17:15:08
  • Zuletzt bearbeitet 04.11.2025 20:16:30

Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a...