First published: Tue Feb 27 2018(Updated: )
An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=4.8.0<=4.10.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7542 has a severity rating that indicates it can lead to a denial of service due to a null pointer dereference.
To fix CVE-2018-7542, upgrade to Xen version 4.11.4+107-gef32c7afa2-1 or later, or any of the other specified secure versions.
Xen versions from 4.8.x through 4.10.x are affected by CVE-2018-7542.
CVE-2018-7542 affects x86 PVH guest operating systems running on vulnerable Xen hypervisors.
Exploitation of CVE-2018-7542 can result in a hypervisor crash, leading to service disruption.