CVE-2018-15469
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).
Se ha descubierto un problema en Xen hasta las versiones 4.11.x. ARM nunca implementó correctamente la tabla grant v2, ni en el hipervisor ni en Linux. Desafortunadamente, un guest de ARM todavía puede solicitar tablas grant v2; simplemente no se configurarán correctamente, lo que resultará en hiperllamadas que afectarán a las comprobaciones de BUG(). Un guest no privilegiado puede provocar una comprobación de BUG() en el hipervisor, lo que provoca una denegación de servicio (cierre inesperado).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-08-17 CVE Reserved
- 2018-08-17 CVE Published
- 2023-08-11 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://xenbits.xen.org/xsa/advisory-268.html | 2019-03-08 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201810-06 | 2019-03-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | <= 4.11.0 Search vendor "Xen" for product "Xen" and version " <= 4.11.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|