Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2021-28705

    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.12
    • Published: Nov. 24, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-28704

    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.09
    • Published: Nov. 24, 2021
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2021-28703

    grant table v2 status pages may remain accessible after de-allocation (take two) Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2... Read more

    Affected Products : xen
    • EPSS Score: %0.11
    • Published: Dec. 07, 2021
    • Modified: Nov. 21, 2024
  • 7.6

    HIGH
    CVE-2021-28702

    PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR"). These are typically used for platform tasks such as legacy USB emulation. I... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.09
    • Published: Oct. 06, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-28701

    Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.06
    • Published: Sep. 08, 2021
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2021-28700

    xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %2.13
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28699

    inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresse... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.07
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28698

    long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would ite... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.06
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-28697

    grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pag... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.06
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2021-28696

    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untran... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.12
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2021-28695

    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untran... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.14
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2021-28694

    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untran... Read more

    Affected Products : fedora debian_linux xen
    • EPSS Score: %0.14
    • Published: Aug. 27, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28693

    xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" the... Read more

    Affected Products : xen
    • EPSS Score: %0.06
    • Published: Jun. 30, 2021
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-28692

    inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such comma... Read more

    Affected Products : xen
    • EPSS Score: %0.04
    • Published: Jun. 30, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-28691

    Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed p... Read more

    • EPSS Score: %0.04
    • Published: Jun. 29, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-28690

    x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and pre... Read more

    Affected Products : xen
    • EPSS Score: %0.36
    • Published: Jun. 29, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28689

    x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement para... Read more

    Affected Products : xen
    • EPSS Score: %0.08
    • Published: Jun. 11, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-28688

    The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning u... Read more

    Affected Products : linux_kernel debian_linux
    • EPSS Score: %0.07
    • Published: Apr. 06, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28687

    HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initiali... Read more

    Affected Products : xen
    • EPSS Score: %0.04
    • Published: Jun. 11, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-28686

    AsIO2_64.sys and AsIO2_32.sys in ASUS GPUTweak II before 2.3.0.3 allow low-privileged users to trigger a stack-based buffer overflow. This could enable low-privileged users to achieve Denial of Service via a DeviceIoControl.... Read more

    Affected Products : gputweak_ii
    • EPSS Score: %0.06
    • Published: Apr. 08, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291295 Results