First published: Sat Dec 08 2018(Updated: )
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=4.11.0<=4.11.1 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19966 has a high severity due to its potential to cause denial of service or host OS privilege escalation.
To fix CVE-2018-19966, update the Xen hypervisor to the latest version available that addresses this vulnerability.
CVE-2018-19966 affects Xen versions prior to 4.11.4, as well as certain versions in the 4.14 and 4.17 series.
The impact of CVE-2018-19966 can include host OS crashes and potential privilege escalation for x86 PV guest OS users.
Yes, CVE-2018-19966 specifically affects systems running the Xen hypervisor, including certain versions of Debian.