Логотип exploitDog
bind:"CVE-2026-23553"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2026-23553"

Количество 8

Количество 8

ubuntu логотип

CVE-2026-23553

2 месяца назад

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2026-23553

2 месяца назад

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
EPSS: Низкий
debian логотип

CVE-2026-23553

2 месяца назад

In the context switch logic Xen attempts to skip an IBPB in the case o ...

CVSS3: 2.9
EPSS: Низкий
github логотип

GHSA-pxqc-5jg3-xfqm

2 месяца назад

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0589-1

около 1 месяца назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0329-1

2 месяца назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0306-1

2 месяца назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0328-1

2 месяца назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-23553

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
0%
Низкий
2 месяца назад
nvd логотип
CVE-2026-23553

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
0%
Низкий
2 месяца назад
debian логотип
CVE-2026-23553

In the context switch logic Xen attempts to skip an IBPB in the case o ...

CVSS3: 2.9
0%
Низкий
2 месяца назад
github логотип
GHSA-pxqc-5jg3-xfqm

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

CVSS3: 2.9
0%
Низкий
2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0589-1

Security update for xen

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0329-1

Security update for xen

2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0306-1

Security update for xen

2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0328-1

Security update for xen

2 месяца назад

Уязвимостей на страницу