Количество 4
Количество 4
CVE-2025-21818
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-21818
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: x86/xen: fix xen_hypercall_hvm() to not clobber %rbx xen_hypercall_hvm(), which is used when running as a Xen PVH guest at most only once during early boot, is clobbering %rbx. Depending on whether the caller relies on %rbx to be preserved across the call or not, this clobbering might result in an early crash of the system.
CVE-2025-21818
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-f7q5-fwf8-r5q4
In the Linux kernel, the following vulnerability has been resolved: x86/xen: fix xen_hypercall_hvm() to not clobber %rbx xen_hypercall_hvm(), which is used when running as a Xen PVH guest at most only once during early boot, is clobbering %rbx. Depending on whether the caller relies on %rbx to be preserved across the call or not, this clobbering might result in an early crash of the system. This can be avoided by using an already saved register instead of %rbx.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-21818 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 10 месяцев назад | |||
CVE-2025-21818 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: x86/xen: fix xen_hypercall_hvm() to not clobber %rbx xen_hypercall_hvm(), which is used when running as a Xen PVH guest at most only once during early boot, is clobbering %rbx. Depending on whether the caller relies on %rbx to be preserved across the call or not, this clobbering might result in an early crash of the system. | CVSS3: 4.4 | 10 месяцев назад | ||
CVE-2025-21818 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 10 месяцев назад | |||
GHSA-f7q5-fwf8-r5q4 In the Linux kernel, the following vulnerability has been resolved: x86/xen: fix xen_hypercall_hvm() to not clobber %rbx xen_hypercall_hvm(), which is used when running as a Xen PVH guest at most only once during early boot, is clobbering %rbx. Depending on whether the caller relies on %rbx to be preserved across the call or not, this clobbering might result in an early crash of the system. This can be avoided by using an already saved register instead of %rbx. | 10 месяцев назад |
Уязвимостей на страницу