Логотип exploitDog
bind:CVE-2019-19577
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19577

Количество 16

Количество 16

ubuntu логотип

CVE-2019-19577

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

CVSS3: 7.2
EPSS: Низкий
redhat логотип

CVE-2019-19577

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2019-19577

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given dire

CVSS3: 7.2
EPSS: Низкий
debian логотип

CVE-2019-19577

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM gue ...

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-6gpv-cjwj-gqjp

больше 3 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

EPSS: Низкий
fstec логотип

BDU:2020-01427

около 6 лет назад

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3296-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0011-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3338-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3309-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3310-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1630-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0334-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3297-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14444-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0388-1

почти 6 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-19577

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

CVSS3: 7.2
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-19577

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

CVSS3: 7.6
0%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-19577

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given dire

CVSS3: 7.2
0%
Низкий
около 6 лет назад
debian логотип
CVE-2019-19577

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM gue ...

CVSS3: 7.2
0%
Низкий
около 6 лет назад
github логотип
GHSA-6gpv-cjwj-gqjp

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given d...

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01427

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.2
0%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3296-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0011-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3338-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3309-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3310-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1630-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0334-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3297-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:14444-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0388-1

Security update for xen

почти 6 лет назад

Уязвимостей на страницу