Логотип exploitDog
bind:CVE-2021-28689
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-28689

Количество 13

Количество 13

ubuntu логотип

CVE-2021-28689

больше 4 лет назад

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt ...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2021-28689

больше 4 лет назад

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt in

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2021-28689

больше 4 лет назад

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1648-1

больше 4 лет назад

Security update for xen

EPSS: Низкий
github логотип

GHSA-45vh-fhgx-cr2p

больше 3 лет назад

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt ...

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2021-03554

почти 5 лет назад

Уязвимость реализации режима паравиртуализации (PV) гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3728-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3665-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4051-1

около 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4241-1

около 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3971-1

около 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3925-1

около 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3928-1

около 3 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-28689

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt ...

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-28689

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt in

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-28689

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests ...

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1648-1

Security update for xen

0%
Низкий
больше 4 лет назад
github логотип
GHSA-45vh-fhgx-cr2p

x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt ...

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03554

Уязвимость реализации режима паравиртуализации (PV) гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:3728-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3665-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4051-1

Security update for xen

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4241-1

Security update for xen

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3971-1

Security update for xen

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3925-1

Security update for xen

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3928-1

Security update for xen

около 3 лет назад

Уязвимостей на страницу