CVE-2018-12891Improperly Implemented Security Check for Standard in XEN

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 77.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 2
Latest updateMay 13

Description

An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9 (bookworm)
Debianxen/xen< 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9+3
NVDxen/xen4.10.1

Also affects: Debian Linux 8.0, 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7945-69h3-wr87: An issue was discovered in Xen through 42022-05-13
OSV
CVE-2018-12891: An issue was discovered in Xen through 42018-07-02

📋Vendor Advisories

2
Red Hat
xen: preemption checks bypassed in x86 PV MM handling (XSA-264)2018-06-27
Debian
CVE-2018-12891: xen - An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may tak...2018

💬Community

2
Bugzilla
CVE-2018-12891 xen: preemption checks bypassed in x86 PV MM handling (XSA-264) [fedora-all]2018-06-27
Bugzilla
CVE-2018-12891 xen: preemption checks bypassed in x86 PV MM handling (XSA-264)2018-06-13