First published: Thu Aug 23 2012(Updated: )
set_debugreg allows writes to reserved bits of the DR7 debug control register on x86-64. A malicious guest can cause the host to crash, leading to a DoS. If the vulnerable hypervisor is run on future hardware, the impact of the vulnerability might be widened depending on the future assignment of the currently-reserved debug register bits. All systems running 64-bit paravirtualised guests are vulnerable to this issue. Acknowledgements: Red Hat would like to thank the Xen project for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenServer | <=6.0.2 | |
Citrix XenServer | <=6.0.2 | |
Xen Xen | =4.0.0 | |
Xen Xen | =4.0.0 | |
Xen Xen | =4.1.0 | |
Xen Xen | =4.1.0 | |
Xen Xen | =4.2.0 | |
Xen Xen | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.