Vulnerability CVE-2018-19965


Published: 2018-12-07   Modified: 2018-12-08

Description:
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.

Type:

CWE-noinfo

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.7/10
6.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
XEN -> XEN 
Debian -> Debian linux 
Citrix -> Xenserver 

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
http://www.securityfocus.com/bid/106182
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXC6BME7SXJI2ZIATNXCAH7RGPI4UKTT/
https://support.citrix.com/article/CTX239432
https://www.debian.org/security/2019/dsa-4369
https://xenbits.xen.org/xsa/advisory-279.html

Copyright 2024, cxsecurity.com

 

Back to Top