CVE-2019-19582
Published: 11 December 2019
An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with a compile time known size of 64 may incur undefined behavior, which may in particular result in infinite loops. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. x86 systems with 64 or more nodes are vulnerable (there might not be any such systems that Xen would run on). x86 systems with less than 64 nodes are not vulnerable.
Notes
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
groovy |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
hirsute |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
impish |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
jammy |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
kinetic |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
lunar |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
mantic |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
noble |
Not vulnerable
(4.11.3+24-g14b62ab3e5-1ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |