First published: Sat Dec 08 2018(Updated: )
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen Xen | <=4.11.1 | |
Citrix XenServer | =7.0 | |
Citrix XenServer | =7.1-cu1 | |
Citrix XenServer | =7.5 | |
Citrix XenServer | =7.6 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
It is a vulnerability in Xen through 4.11.x that allows 64-bit PV guest OS users to cause a denial of service (host OS crash) due to an incorrect Meltdown (CVE-2017-5754) mitigation.
The severity of CVE-2018-19965 vulnerability is medium with a severity value of 5.6.
CVE-2018-19965 affects Xen versions up to 4.11.x and allows 64-bit PV guest OS users to crash the host OS.
To fix CVE-2018-19965 vulnerability in Xen, update to versions 4.11.4+107-gef32c7afa2-1, 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2+55-g0b56bed864-1 depending on your Debian distribution.
You can find more information about CVE-2018-19965 vulnerability in Xen in the advisory published at https://xenbits.xen.org/xsa/advisory-279.txt.