CVE-2019-18422

NameCVE-2019-18422
DescriptionAn issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4602-1
NVD severityhigh
Debian Bugs947944

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xen (PTS)jessie4.4.1-9+deb8u10vulnerable
jessie (security)4.4.4lts5-0+deb8u1vulnerable
stretch4.8.5+shim4.10.2+xsa282-1+deb9u11vulnerable
stretch (security)4.8.5.final+shim4.10.4-1+deb9u12fixed
buster4.11.1+92-g6c33308a8d-2vulnerable
buster (security)4.11.3+24-g14b62ab3e5-1~deb10u1fixed
bullseye, sid4.11.3+24-g14b62ab3e5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xensource(unstable)4.11.3+24-g14b62ab3e5-1947944
xensourcebuster4.11.3+24-g14b62ab3e5-1~deb10u1DSA-4602-1
xensourcestretch4.8.5.final+shim4.10.4-1+deb9u12DSA-4602-1

Notes

https://xenbits.xen.org/xsa/advisory-303.html

Search for package or bug name: Reporting problems