First published: Wed Dec 11 2019(Updated: )
An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen xen-unstable | >=4.8.0<=4.12.1 | |
Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19581 has been assessed as having a medium severity level due to the potential for denial of service.
To mitigate CVE-2019-19581, upgrade your Xen hypervisor to 4.12.1 or later versions.
Xen versions from 4.8.0 up to 4.12.1 are affected by CVE-2019-19581.
CVE-2019-19581 allows 32-bit Arm guest OS users to cause a denial of service through out-of-bounds access.
There is no specific workaround for CVE-2019-19581; the recommended action is to apply available updates.