Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-15468

Опубликовано: 17 авг. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 6

Описание

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

not-affected

4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
esm-apps/jammy

not-affected

4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
esm-apps/noble

not-affected

4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
esm-infra/bionic

needed

Показывать по

EPSS

Процентиль: 31%
0.00115
Низкий

4.9 Medium

CVSS2

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
redhat
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
nvd
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
debian
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contai ...

CVSS3: 6
github
больше 3 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

suse-cvrf
больше 7 лет назад

Security update for xen

EPSS

Процентиль: 31%
0.00115
Низкий

4.9 Medium

CVSS2

6 Medium

CVSS3