Логотип exploitDog
bind:CVE-2019-19583
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19583

Количество 16

Количество 16

ubuntu логотип

CVE-2019-19583

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-19583

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2019-19583

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-19583

около 6 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH gue ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-5g75-j346-c9xj

больше 3 лет назад

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2020-01431

около 6 лет назад

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3296-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0011-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3338-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3309-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3310-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1630-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0334-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3297-1

около 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14444-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0388-1

почти 6 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-19583

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
2%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-19583

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 6.2
2%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-19583

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
2%
Низкий
около 6 лет назад
debian логотип
CVE-2019-19583

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH gue ...

CVSS3: 7.5
2%
Низкий
около 6 лет назад
github логотип
GHSA-5g75-j346-c9xj

An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01431

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
2%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3296-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0011-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3338-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3309-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3310-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1630-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0334-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3297-1

Security update for xen

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:14444-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0388-1

Security update for xen

почти 6 лет назад

Уязвимостей на страницу