First published: Fri Aug 17 2018(Updated: )
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-15468 is considered moderate as it involves the potential for system instability and could lead to denial-of-service situations.
To fix CVE-2018-15468, update the Xen hypervisor to version 4.11.1 or later.
CVE-2018-15468 can lead to issues with system stability and may cause the system to lock up under certain conditions.
Yes, Xen version 4.11.0 is vulnerable to CVE-2018-15468 and should be updated to mitigate the risk.
CVE-2018-15468 affects systems running Xen hypervisor versions up to and including 4.11.0.