First published: Fri Apr 27 2018(Updated: )
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen xen-unstable | <=4.10.1 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2018-10472 vulnerability is considered to be of medium severity as it enables x86 HVM guest OS users to read arbitrary dom0 files.
To fix CVE-2018-10472, upgrade to a version of Xen that is 4.11.4+107-gef32c7afa2-1 or later, or any of the specified patched versions.
CVE-2018-10472 affects Xen versions up to and including 4.10.1.
Yes, CVE-2018-10472 allows x86 HVM guest OS users to read arbitrary dom0 files under certain configurations.
CVE-2018-10472 impacts Xen installations and specifically Debian GNU/Linux systems running version 9.0 among others.