First published: Sat Dec 08 2018(Updated: )
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen Xen | <=4.11.1 | |
Debian Debian Linux | =9.0 | |
Citrix XenServer | =7.0 | |
Citrix XenServer | =7.1-cu1 | |
Citrix XenServer | =7.5 | |
Citrix XenServer | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19962 is a vulnerability in Xen that allows guest OS users to gain host OS privileges.
The severity of CVE-2018-19962 is high with a CVSS score of 7.8.
AMD x86 platforms running Xen through version 4.11.x are affected by CVE-2018-19962.
Guest OS users can exploit CVE-2018-19962 by combining small IOMMU mappings into larger ones.
To fix CVE-2018-19962, update Xen to version 4.11.4+107-gef32c7afa2-1 or a later version.