First published: Thu May 10 2018(Updated: )
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen XAPI | <=4.10.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10982 has a high severity as it can lead to denial of service or potential hypervisor privilege escalation.
Mitigation of CVE-2018-10982 can be achieved by upgrading to versions 4.11.4+107-gef32c7afa2-1 or higher for Xen.
CVE-2018-10982 affects several versions of Xen, specifically those up to 4.10.1 and certain Debian Linux distributions.
CVE-2018-10982 is a denial of service vulnerability that may also allow privilege escalation within the hypervisor.
Administrators and users of Xen-based virtual environments should be particularly concerned about CVE-2018-10982.