SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen PageTable Freezing Bug Lets Local Administrativer Users on the Guest System Consume Excessive Physical CPU Resources
SecurityTracker Alert ID:  1040773
SecurityTracker URL:  http://securitytracker.com/id/1040773
CVE Reference:   CVE-2018-7540   (Links to External Site)
Date:  Apr 28 2018
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.5.x, 4.6.x, 4.7.x, 4.8.x, 4.9.x
Description:   A vulnerability was reported in Xen. A local administrative user on a guest system can consume excessive CPU resources on the target system.

A local administrative user on a PV guest system can trigger a pagetable memory unpinning error to consume excessive physical CPU resources on the target system.

x86 systems are affected. ARM systems are not affected.

Jann Horn of Google Project Zero reported this vulnerability.

Impact:   A local administrative user on a guest system can consume excessive CPU resources on the target system.
Solution:   The vendor has issued a fix (xsa252-4.6.patch, xsa252-4.7.patch, xsa252-4.9.patch, and xsa252.patch).

The vendor advisory is available at:

http://xenbits.xen.org/xsa/advisory-252.html

Vendor URL:  xenbits.xen.org/xsa/advisory-252.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC