Логотип exploitDog
bind:"CVE-2018-15468"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-15468"

Количество 9

Количество 9

ubuntu логотип

CVE-2018-15468

больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2018-15468

больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2018-15468

больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2018-15468

больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contai ...

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-m48w-fvxv-5j3g

больше 3 лет назад

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3332-1

больше 7 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3490-1

больше 7 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:4304-1

около 7 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:4300-1

около 7 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-15468

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-15468

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-15468

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-15468

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contai ...

CVSS3: 6
0%
Низкий
больше 7 лет назад
github логотип
GHSA-m48w-fvxv-5j3g

An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.

CVSS3: 6
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2018:3332-1

Security update for xen

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3490-1

Security update for xen

больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4304-1

Security update for xen

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:4300-1

Security update for xen

около 7 лет назад

Уязвимостей на страницу