Search for packages
| purl | pkg:deb/debian/xen@4.14.6-1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1tb8-t91c-63bp
Aliases: CVE-2024-2201 XSA-456 |
x86: Native Branch History Injection |
Affected by 3 other vulnerabilities. |
|
VCID-26a9-9zz3-wfhh
Aliases: CVE-2025-58147 XSA-475 |
x86: Incorrect input sanitisation in Viridian hypercalls |
Affected by 3 other vulnerabilities. |
|
VCID-2trm-w3ww-cfhk
Aliases: CVE-2025-27466 |
Mutiple vulnerabilities in the Viridian interface |
Affected by 3 other vulnerabilities. |
|
VCID-3bw4-631f-e7h6
Aliases: CVE-2023-34321 XSA-437 |
arm32: The cache may not be properly cleaned/invalidated |
Affected by 3 other vulnerabilities. |
|
VCID-3se4-qv6j-xqfq
Aliases: CVE-2024-31143 XSA-458 |
double unlock in x86 guest IRQ handling |
Affected by 3 other vulnerabilities. |
|
VCID-3vdg-5g64-wkbt
Aliases: CVE-2023-46841 XSA-451 |
x86: shadow stack vs exceptions from emulation stubs |
Affected by 3 other vulnerabilities. |
|
VCID-46ad-1k9n-j3hm
Aliases: CVE-2022-26365 |
Linux disk/nic frontends data leaks |
Affected by 3 other vulnerabilities. |
|
VCID-4cdt-ycjx-6ub4
Aliases: CVE-2022-33741 XSA-403 |
Linux disk/nic frontends data leaks |
Affected by 3 other vulnerabilities. |
|
VCID-4k7p-3g95-n7dm
Aliases: CVE-2024-45818 XSA-463 |
Deadlock in x86 HVM standard VGA handling |
Affected by 3 other vulnerabilities. |
|
VCID-4pra-prf3-1uff
Aliases: CVE-2025-58149 XSA-476 |
Incorrect removal of permissions on PCI device unplug |
Affected by 3 other vulnerabilities. |
|
VCID-4rmg-db7g-u3hs
Aliases: CVE-2023-46839 XSA-449 |
pci: phantom functions assigned to incorrect contexts |
Affected by 3 other vulnerabilities. |
|
VCID-5ktg-bhh1-ubbz
Aliases: CVE-2023-34320 XSA-436 |
arm: Guests can trigger a deadlock on Cortex-A77 |
Affected by 3 other vulnerabilities. |
|
VCID-5u88-jt28-cfb6
Aliases: CVE-2025-1713 XSA-467 |
deadlock potential with VT-d and legacy PCI device pass-through |
Affected by 3 other vulnerabilities. |
|
VCID-6dax-cddv-7bbs
Aliases: CVE-2023-34328 XSA-444 |
x86/AMD: Debug Mask handling |
Affected by 3 other vulnerabilities. |
|
VCID-6jqj-2qwn-8qd9
Aliases: CVE-2023-34327 |
x86/AMD: Debug Mask handling |
Affected by 3 other vulnerabilities. |
|
VCID-8k1q-b2kj-w7hh
Aliases: CVE-2023-34325 XSA-443 |
Multiple vulnerabilities in libfsimage disk handling |
Affected by 3 other vulnerabilities. |
|
VCID-8tv5-zxmm-r3fk
Aliases: CVE-2023-20588 XSA-439 |
x86/AMD: Divide speculative information leak |
Affected by 3 other vulnerabilities. |
|
VCID-97zm-r9b6-uqdu
Aliases: CVE-2023-34323 XSA-440 |
xenstored: A transaction conflict can crash C Xenstored |
Affected by 3 other vulnerabilities. |
|
VCID-b57c-x3pw-7fb7
Aliases: CVE-2023-34322 XSA-438 |
top-level shadow reference dropped too early for 64-bit PV guests |
Affected by 3 other vulnerabilities. |
|
VCID-bhdk-jmss-4qc8
Aliases: CVE-2023-46836 XSA-446 |
x86: BTC/SRSO fixes not fully effective |
Affected by 3 other vulnerabilities. |
|
VCID-byu1-7n9c-5fes
Aliases: CVE-2024-2193 XSA-453 |
GhostRace: Speculative Race Conditions |
Affected by 3 other vulnerabilities. |
|
VCID-c4xu-szkm-1kh6
Aliases: CVE-2025-58145 |
Arm issues with page refcounting |
Affected by 3 other vulnerabilities. |
|
VCID-ee3z-24pr-kqcm
Aliases: CVE-2024-31145 XSA-460 |
error handling in x86 IOMMU identity mapping |
Affected by 3 other vulnerabilities. |
|
VCID-ejhc-6yqt-gkgv
Aliases: CVE-2024-28956 XSA-469 |
x86: Indirect Target Selection |
Affected by 3 other vulnerabilities. |
|
VCID-evcg-2z3p-gbch
Aliases: CVE-2024-31146 |
PCI device pass-through with shared resources |
Affected by 3 other vulnerabilities. |
|
VCID-h9hz-vur7-kyhg
Aliases: CVE-2025-58148 |
x86: Incorrect input sanitisation in Viridian hypercalls |
Affected by 3 other vulnerabilities. |
|
VCID-j22f-mbqe-a7dk
Aliases: CVE-2024-36350 |
x86: Transitive Scheduler Attacks |
Affected by 3 other vulnerabilities. |
|
VCID-p2fk-8snj-x7dy
Aliases: CVE-2023-28746 XSA-452 |
x86: Register File Data Sampling |
Affected by 3 other vulnerabilities. |
|
VCID-psaa-jdr7-e3fm
Aliases: CVE-2024-45819 XSA-464 |
libxl leaks data to PVH guests via ACPI tables |
Affected by 3 other vulnerabilities. |
|
VCID-q3p3-tgay-6kcs
Aliases: CVE-2022-33740 |
Linux disk/nic frontends data leaks |
Affected by 3 other vulnerabilities. |
|
VCID-qpfc-3296-9ub3
Aliases: CVE-2026-23553 XSA-479 |
x86: incomplete IBPB for vCPU isolation |
Affected by 2 other vulnerabilities. |
|
VCID-qsma-2ufh-jybe
Aliases: CVE-2026-23555 XSA-481 |
Xenstored DoS by unprivileged domain |
Affected by 3 other vulnerabilities. |
|
VCID-rdub-9bhg-nbc6
Aliases: CVE-2024-45817 XSA-462 |
x86: Deadlock in vlapic_error() |
Affected by 3 other vulnerabilities. |
|
VCID-rk2f-yqbb-nyd2
Aliases: CVE-2023-46837 XSA-447 |
arm32: The cache may not be properly cleaned/invalidated (take two) |
Affected by 3 other vulnerabilities. |
|
VCID-rt5n-e4wq-p3gh
Aliases: CVE-2023-46842 XSA-454 |
x86 HVM hypercalls may trigger Xen bug check |
Affected by 3 other vulnerabilities. |
|
VCID-tjgh-waa3-wqgk
Aliases: CVE-2025-58144 XSA-473 |
Arm issues with page refcounting |
Affected by 3 other vulnerabilities. |
|
VCID-upju-tcz7-efg1
Aliases: CVE-2025-58150 XSA-477 |
x86: buffer overrun with shadow paging + tracing |
Affected by 2 other vulnerabilities. |
|
VCID-uv8m-bj4c-8fes
Aliases: CVE-2024-36357 XSA-471 |
x86: Transitive Scheduler Attacks |
Affected by 3 other vulnerabilities. |
|
VCID-vv23-mvyn-87hg
Aliases: CVE-2025-58143 |
Mutiple vulnerabilities in the Viridian interface |
Affected by 3 other vulnerabilities. |
|
VCID-wd4s-jxuf-skbp
Aliases: CVE-2023-46835 XSA-445 |
x86/AMD: mismatch in IOMMU quarantine page table levels |
Affected by 3 other vulnerabilities. |
|
VCID-wz1m-aeaf-nkg7
Aliases: CVE-2025-58142 XSA-472 |
Mutiple vulnerabilities in the Viridian interface |
Affected by 3 other vulnerabilities. |
|
VCID-xqpz-y83m-4uc4
Aliases: CVE-2025-27465 XSA-470 |
x86: Incorrect stubs exception handling for flags recovery |
Affected by 3 other vulnerabilities. |
|
VCID-ye1t-qhtx-sucm
Aliases: CVE-2023-34326 XSA-442 |
x86/AMD: missing IOMMU TLB flushing |
Affected by 3 other vulnerabilities. |
|
VCID-z9rm-9p2q-wfag
Aliases: CVE-2024-31142 XSA-455 |
x86: Incorrect logic for BTC/SRSO mitigations |
Affected by 3 other vulnerabilities. |
|
VCID-zkeg-d5d5-vbda
Aliases: CVE-2022-33742 |
Linux disk/nic frontends data leaks |
Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1wgc-r96w-7kg9 | IRQ vector leak on x86 |
CVE-2021-3308
XSA-360 |
| VCID-1wtd-67ef-1qej | IOMMU page mapping issues on x86 |
CVE-2021-28695
|
| VCID-1x3w-n7ms-eqeh | oxenstored memory leak in reset_watches |
CVE-2020-29485
XSA-330 |
| VCID-28t2-hng7-tfe5 | missed flush in XSA-321 backport |
CVE-2021-27379
|
| VCID-2n9p-6t7s-kqc5 | arm: The cache may not be cleaned for newly allocated scrubbed pages |
CVE-2021-26933
XSA-364 |
| VCID-2uap-2vm1-efcr | Retbleed - arbitrary speculative code execution with return instructions |
CVE-2022-29900
|
| VCID-32w3-vmcb-wfd9 | xen/arm: Boot modules are not scrubbed |
CVE-2021-28693
XSA-372 |
| VCID-34gr-dtsz-1fab | x86: Race condition in Xen mapping code |
CVE-2020-27672
XSA-345 |
| VCID-34ng-ftbx-e3cm | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42317
|
| VCID-39t8-p1q7-eyag | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42318
|
| VCID-3d53-4qtr-myhm | x86 shadow plus log-dirty mode use-after-free |
CVE-2022-42332
XSA-427 |
| VCID-3pxf-xndw-5fft | Xenstore: guests can crash xenstored via watchs |
CVE-2020-29484
XSA-324 |
| VCID-3whm-8fyv-zyhd | race when migrating timers between x86 HVM vCPU-s |
CVE-2020-25604
XSA-336 |
| VCID-416b-93m6-jyby | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42313
|
| VCID-42ma-8ash-j7c8 | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42311
|
| VCID-4429-qf2w-jqg3 | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21166
XSA-404 |
| VCID-4spa-usqt-93b2 | x86 pv: Race condition in typeref acquisition |
CVE-2022-26362
XSA-401 |
| VCID-5cw7-rv5f-jfaq | insufficient TLB flush for x86 PV guests in shadow mode |
CVE-2022-33745
XSA-408 |
| VCID-5dbd-kz24-6fc1 | issues with partially successful P2M updates on x86 |
CVE-2021-28709
XSA-389 |
| VCID-6kh6-edk7-xkcc | unsafe AMD IOMMU page table updates |
CVE-2020-27670
XSA-347 |
| VCID-6xbp-t4qh-tbhv | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42312
XSA-326 |
| VCID-77st-3475-5kdr | HVM soft-reset crashes toolstack |
CVE-2021-28687
XSA-368 |
| VCID-7d5b-66n7-zbe1 | x86/HVM pinned cache attributes mis-handling |
CVE-2022-42333
CVE-2022-43334 XSA-428 |
| VCID-7ek3-weqx-9fhs | x86: Multiple speculative security issues |
CVE-2022-23824
XSA-422 |
| VCID-7etc-u5ya-zued | IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues |
CVE-2022-26358
|
| VCID-7t5h-jy8h-t3d4 | Xenstore: Cooperating guests can create arbitrary numbers of nodes |
CVE-2022-42323
|
| VCID-7wyt-uh2c-a3ha | x86 pv: Insufficient care with non-coherent mappings |
CVE-2022-26363
|
| VCID-7ysh-usku-c3dz | x86/HVM pinned cache attributes mis-handling |
CVE-2022-42334
|
| VCID-7zpj-3par-s3b5 | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42316
|
| VCID-87tq-2me2-d3bb | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42314
|
| VCID-8cb8-vq2c-q3e9 | Xenstore: Guests can crash xenstored |
CVE-2022-42309
XSA-414 |
| VCID-8r8y-8bq2-jufj | oxenstored: permissions not checked on root node |
CVE-2020-29479
XSA-353 |
| VCID-91hk-73kq-83g6 | lock order inversion in transitive grant copy handling |
CVE-2022-33748
XSA-411 |
| VCID-9hr5-p18q-7qb8 | FIFO event channels control structure ordering |
CVE-2020-29571
XSA-359 |
| VCID-9s43-gewn-bycc | grant table v2 status pages may remain accessible after de-allocation (take two) |
CVE-2021-28703
XSA-387 |
| VCID-9zqd-3x84-43gc | arm: guest_physmap_remove_page not removing the p2m mappings |
CVE-2022-23033
XSA-393 |
| VCID-az8d-xrb4-3ug4 | Another race in XENMAPSPACE_grant_table handling |
CVE-2021-28701
XSA-384 |
| VCID-b7tb-ns1t-fyaw | IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues |
CVE-2022-26361
|
| VCID-bc6f-wu8g-5yb4 | Xenstore: guests can disturb domain cleanup |
CVE-2020-29483
XSA-325 |
| VCID-bs56-1z79-uqbt | x86 pv guest kernel DoS via SYSENTER |
CVE-2020-25596
XSA-339 |
| VCID-bxae-85uh-uyek | PoD operations on misaligned GFNs |
CVE-2021-28708
|
| VCID-bxb7-7gpw-qybb | Xenstore: guests can let run xenstored out of memory |
CVE-2022-42315
|
| VCID-bzve-5gwu-8ydb | x86 pv: Crash when handling guest access to MSR_MISC_ENABLE |
CVE-2020-25602
XSA-333 |
| VCID-csy7-esn4-u3gq | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21123
|
| VCID-d3ad-6tme-bfem | oxenstored: node ownership can be changed by unprivileged clients |
CVE-2020-29486
XSA-352 |
| VCID-dfjm-gwzm-jqbt | Oxenstored 32->31 bit integer truncation issues |
CVE-2022-42324
XSA-420 |
| VCID-dgm4-ye4m-1fcq | Xenstore: Guests can get access to Xenstore nodes of deleted domains |
CVE-2022-42320
XSA-417 |
| VCID-dj1v-h79p-9ydz | Racy interactions between dirty vram tracking and paging log dirty hypercalls |
CVE-2022-26356
XSA-397 |
| VCID-dqy9-zkvw-e3gk | lack of preemption in evtchn_reset() / evtchn_destroy() |
CVE-2020-25601
XSA-344 |
| VCID-drhd-ytb7-u3em | Xenstore: new domains inheriting existing node permissions |
CVE-2020-29481
XSA-322 |
| VCID-e96u-uwba-kfg5 | Speculative Code Store Bypass |
CVE-2021-26313
|
| VCID-eb8v-p31a-yuhu | once valid event channels may not turn invalid |
CVE-2020-25597
XSA-338 |
| VCID-eka3-u8e5-3uad | undue deferral of IOMMU TLB flushes |
CVE-2020-27671
XSA-346 |
| VCID-ep7n-um5m-ekgk | PCI passthrough code reading back hardware registers |
CVE-2020-25595
XSA-337 |
| VCID-fekb-fbhz-y7g7 | PoD operations on misaligned GFNs |
CVE-2021-28704
XSA-388 |
| VCID-fhbs-3nvf-tbha | Arm: unbounded memory consumption for 2nd-level page tables |
CVE-2022-33747
XSA-409 |
| VCID-fqt9-2esb-ffan | PCI devices with RMRRs not deassigned correctly |
CVE-2021-28702
XSA-386 |
| VCID-g72t-7kx1-abcs | xen/arm: No memory limit for dom0less domUs |
CVE-2021-28700
XSA-383 |
| VCID-gdsj-4cbx-ufep | issues with partially successful P2M updates on x86 |
CVE-2021-28705
|
| VCID-gj1u-mbaj-kyc5 | Xenstore: Guests can create orphaned Xenstore nodes |
CVE-2022-42310
XSA-415 |
| VCID-h9c6-yw5r-v3ex | infinite loop when cleaning up IRQ vectors |
CVE-2020-29567
XSA-356 |
| VCID-hg4z-ad3f-fbc2 | x86 pv: Insufficient care with non-coherent mappings |
CVE-2022-26364
XSA-402 |
| VCID-hsau-swt9-kyf7 | Xenstore: Guests can cause Xenstore to not free temporary memory |
CVE-2022-42319
XSA-416 |
| VCID-hx7j-eymk-4ygk | IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues |
CVE-2022-26359
|
| VCID-hyup-47wa-pfac | x86: TSX Async Abort protections not restored after S3 |
CVE-2021-28690
XSA-377 |
| VCID-jwdv-qe4x-yfgw | race in VT-d domain ID cleanup |
CVE-2022-26357
XSA-399 |
| VCID-k5j4-3xmv-a7bk | undue recursion in x86 HVM context switch code |
CVE-2020-29566
XSA-348 |
| VCID-kcj6-ua4t-ybgj | IOMMU page mapping issues on x86 |
CVE-2021-28696
|
| VCID-knqd-zktw-cydm | Speculative Code Store Bypass |
CVE-2021-0089
XSA-375 |
| VCID-mcs2-ndqd-tydv | x86: speculative vulnerability in 32bit SYSCALL path |
CVE-2022-42331
XSA-429 |
| VCID-mf8g-nbkw-f7gr | grant table v2 status pages may remain accessible after de-allocation |
CVE-2021-28697
XSA-379 |
| VCID-n3t2-m6br-ufb3 | stack corruption from XSA-346 change |
CVE-2020-29040
XSA-355 |
| VCID-n7pg-b7kc-wkew | inappropriate x86 IOMMU timeout detection / handling |
CVE-2021-28692
XSA-373 |
| VCID-ndz3-372h-8fhk | FIFO event channels control block related ordering |
CVE-2020-29570
XSA-358 |
| VCID-p3uc-18e9-skb4 | xenstore watch notifications lacking permission checks |
CVE-2020-29480
XSA-115 |
| VCID-p7ug-wwk5-63gb | out of bounds event channels available to 32-bit x86 domains |
CVE-2020-25600
XSA-342 |
| VCID-pb8n-hmsc-syfw | P2M pool freeing may take excessively long |
CVE-2022-33746
XSA-410 |
| VCID-pphm-ygb7-q7g2 | Xenstore: Cooperating guests can create arbitrary numbers of nodes |
CVE-2022-42322
XSA-419 |
| VCID-pzt3-abab-4kdd | x86 PV guest INVLPG-like flushes may leave stale TLB entries |
CVE-2020-27674
XSA-286 |
| VCID-qnew-xqte-kbej | Xenstore: Guests can crash xenstored via exhausting the stack |
CVE-2022-42321
XSA-418 |
| VCID-qprv-989b-k3d3 | IOMMU page mapping issues on x86 |
CVE-2021-28694
XSA-378 |
| VCID-s4nf-p69f-pue8 | inadequate grant-v2 status frames array bounds check |
CVE-2021-28699
XSA-382 |
| VCID-td6e-x2qb-syg3 | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21125
|
| VCID-uunr-69dt-q7fn | long running loops in grant table handling |
CVE-2021-28698
XSA-380 |
| VCID-uvcp-ad38-2kcs | Xenstore: wrong path length check |
CVE-2020-29482
XSA-323 |
| VCID-vb2u-yc2z-ayh5 | Missing memory barriers when accessing/allocating an event channel |
CVE-2020-25603
XSA-340 |
| VCID-vs9k-akwv-h3ak | A PV guest could DoS Xen while unmapping a grant |
CVE-2022-23034
XSA-394 |
| VCID-w2ch-guy5-6ye9 | Insufficient cleanup of passed-through device IRQs |
CVE-2022-23035
XSA-395 |
| VCID-wh75-sc4f-qqc1 | Xenstore: Guests can create arbitrary number of nodes via transactions |
CVE-2022-42325
XSA-421 |
| VCID-xcvw-eex8-j3bf | PoD operations on misaligned GFNs |
CVE-2021-28707
|
| VCID-xe4j-gg7f-wyfa | races with evtchn_reset() |
CVE-2020-25599
XSA-343 |
| VCID-z3g4-1vhq-97dj | Xenstore: Guests can create arbitrary number of nodes via transactions |
CVE-2022-42326
|
| VCID-z3qj-cnxq-pkgq | guests may exceed their designated memory limit |
CVE-2021-28706
XSA-385 |
| VCID-z8zf-cqkb-guge | IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues |
CVE-2022-26360
XSA-400 |
| VCID-zkyv-h5at-xkgq | Retbleed - arbitrary speculative code execution with return instructions |
CVE-2022-23825
XSA-407 |
| VCID-zrxf-3w1d-t3ba | Information leak via power sidechannel |
CVE-2020-28368
XSA-351 |