First published: Sat Dec 08 2018(Updated: )
An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.11.1 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19967 has a severity rating of high due to its potential to cause denial of service on the host operating system.
To remediate CVE-2018-19967, update to Xen versions 4.11.4, 4.14.6, or newer as specified in the security advisories.
CVE-2018-19967 affects Xen versions up to and including 4.11.1 and specific configurations of later versions.
CVE-2018-19967 is not directly exploitable remotely; it requires local access to the guest operating system.
CVE-2018-19967 impacts systems running Xen hypervisors on Intel x86 platforms.