Known Vulnerabilities for Xen by Xen

Listed below are 10 of the newest known vulnerabilities associated with the software "Xen" by "Xen".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-23038 Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text e... 7 - HIGH 2022-03-10 2022-07-01
CVE-2022-23037 Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text e... 7 - HIGH 2022-03-10 2022-07-01
CVE-2022-23036 Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text e... 7 - HIGH 2022-03-10 2022-07-01
CVE-2022-23035 Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM... 4.6 - MEDIUM 2022-01-25 2022-08-15
CVE-2022-23034 A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for... 5.5 - MEDIUM 2022-01-25 2022-08-15
CVE-2022-23033 arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pag... 7.8 - HIGH 2022-01-25 2022-08-15
CVE-2022-21166 Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user... 5.5 - MEDIUM 2022-06-15 2022-08-15
CVE-2022-21127 Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user ... 5.5 - MEDIUM 2022-06-15 2022-07-07
CVE-2022-21125 Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentia... 5.5 - MEDIUM 2022-06-15 2022-08-15
CVE-2022-21123 Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially e... 5.5 - MEDIUM 2022-06-15 2022-08-15

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
XenXen4.9.4AllAllAll
Operating
System
XenXen4.9.4AllAllAll
Operating
System
XenXen4.9.3AllAllAll
Operating
System
XenXen4.9.3AllAllAll
Operating
System
XenXen4.9.2AllAllAll
Operating
System
XenXen4.9.2AllAllAll
Operating
System
XenXen4.9.2AllAllAll
Operating
System
XenXen4.9.1AllAllAll
Operating
System
XenXen4.9.1AllAllAll
Operating
System
XenXen4.9.1AllAllAll
Operating
System
XenXen4.9.0AllAllAll
Operating
System
XenXen4.9.0AllAllAll
Operating
System
XenXen4.9.0AllAllAll
Operating
System
XenXen4.9.0-AllAll
Operating
System
XenXen4.9.0rc1AllAll
Operating
System
XenXen4.9.0rc1.1AllAll
Operating
System
XenXen4.9.0rc1.2AllAll
Operating
System
XenXen4.9.0rc2AllAll
Operating
System
XenXen4.9.0rc3AllAll
Operating
System
XenXen4.9.0rc4AllAll

Popular searches for Xen

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report