First published: Sat Dec 08 2018(Updated: )
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen Xen | <=4.11.1 | |
Debian Debian Linux | =9.0 | |
Citrix XenServer | =7.0 | |
Citrix XenServer | =7.1-cu1 | |
Citrix XenServer | =7.5 | |
Citrix XenServer | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-19961.
The severity level of CVE-2018-19961 is high.
CVE-2018-19961 affects AMD x86 platforms.
Guest OS users may be able to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
You can find more information about CVE-2018-19961 in the advisory on xenbits.xen.org and the CVE-2018-19961 page on security-tracker.debian.org.