Описание
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
Ссылки
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Third Party Advisory
- MitigationPatchVendor Advisory
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Third Party Advisory
- MitigationPatchVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
5.6 Medium
CVSS3
4.7 Medium
CVSS2
Дефекты
Связанные уязвимости
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest ...
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
Уязвимость гипервизора Xen, связанная с недостаточной обработкой данных при передаче адреса в код сброса TLB, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5.6 Medium
CVSS3
4.7 Medium
CVSS2