Filter

Xen Security Advisory 466 v3 (CVE-2024-53241) - Xen hypercall page unsafe against speculative attacks

First published (updated )

Xen Security Advisory 466 v3 (CVE-2024-53241) - Xen hypercall page unsafe against speculative attacks

Xen Security Advisory 465 v3 (CVE-2024-53240) - Backend can crash Linux netfront

Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

First published (updated )

Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Xen Security Advisory 463 v2 (CVE-2024-45818) - Deadlock in x86 HVM standard VGA handling

First published (updated )

Xen Security Advisory 462 v2 (CVE-2024-45817) - x86: Deadlock in vlapic_error()

Xen Security Advisory 461 v2 (CVE-2024-31146) - PCI device pass-through with shad sources

Xen Security Advisory 460 v2 (CVE-2024-31145) - error handling in x86 IOMMU identity mapping

Xen Security Advisory 456 v3 (CVE-2024-2201) - x86: Native Branch History Injection

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Xen Hypervisorx86: Incorrect logic for BTC/SRSO mitigations

First published (updated )

Xen Hypervisorx86 HVM hypercalls may trigger Xen bug check

First published (updated )

Xen Security Advisory 447 v2 (CVE-2023-46837) - arm32: The cache may not be properly cleaned/invalidated (take two)

Xen Security Advisory 446 v2 (CVE-2023-46836) - x86: BTC/SRSO fixes not fully effective

Xen Security Advisory 445 v3 (CVE-2023-46835) - x86/AMD: mismatch in IOMMU quarantine page table levels

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Xen Security Advisory 443 v3 (CVE-2023-34325) - Multiple vulnerabilities in libfsimage disk handling

First published (updated )

Xen Security Advisory 439 v1 (CVE-2023-20588) - x86/AMD: Divide speculative information leak

First published (updated )

Xen Security Advisory 439 v1 (CVE-2023-20588) - x86/AMD: Divide speculative information leak

First published (updated )

Xen Security Advisory 439 v1 (CVE-2023-20588) - x86/AMD: Divide speculative information leak

Xen Security Advisory 439 v1 (CVE-2023-20588) - x86/AMD: Divide speculative information leak

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Xen Security Advisory 438 v2 (CVE-2023-34322) - top-level shadow reference dropped too early for 64-bit PV guests

Xen Security Advisory 437 v2 (CVE-2023-34321) - arm32: The cache may not be properly cleaned/invalidated

Xen Security Advisory 433 v3 (CVE-2023-20593) - x86/AMD: Zenbleed

Xen Security Advisory 435 v1 (CVE-2022-40982) - x86/Intel: Gather Data Sampling

First published (updated )

Xen Security Advisory 433 v1 - x86/AMD: Zenbleed

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Xen Project Xen HypervisorISSUE DESCRIPTION ================= The grant table code in Xen has a bespoke semi-lockfree allocat…

First published (updated )

Xen Project Xen HypervisorA bug was found in the way Xen handles instruction emulation during VM exits. Malicious guest user s…

First published (updated )

Xen HypervisorPaolo Bonzini found a bug in Xen hypervisor that can be used to crash the guest. Malicious guest use…

First published (updated )

Xen Project Xen HypervisorDescription of problem: Every paravirt guest (and some fullvirt guests) have a TTY path associated w…

First published (updated )

Xen Project Xen HypervisorDescription of problem: The recent fix to validate the frontend's frame buffer description neglecte…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203