First published: Tue Oct 08 2019(Updated: )
An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen xen-unstable | <=4.12.1 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17349 is classified as a denial of service vulnerability that can lead to an infinite loop.
To fix CVE-2019-17349, upgrade to Xen versions 4.12.2 or later, or apply the relevant patches provided by your Linux distribution.
CVE-2019-17349 affects Xen versions up to 4.12.1 and certain Debian Linux versions including 9.0 and 10.0.
CVE-2019-17349 can potentially be exploited by Arm domU attackers on the same host.
Yes, patches for CVE-2019-17349 are available from the Xen project and relevant Linux distributions.