CVE-2018-15468

NameCVE-2018-15468
DescriptionAn issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4274-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xen (PTS)jessie4.4.1-9+deb8u10fixed
jessie (security)4.4.4lts1-0+deb8u1fixed
buster, sid, stretch4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9vulnerable
stretch (security)4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xensource(unstable)(unfixed)
xensourcejessie(not affected)
xensourcestretch4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10DSA-4274-1

Notes

[jessie] - xen <not-affected> (Only affects 4.6 and later)
https://xenbits.xen.org/xsa/advisory-269.html

Search for package or bug name: Reporting problems