CVE-2018-10982

Priority
Description
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS
users to cause a denial of service (unexpectedly high interrupt number,
array overrun, and hypervisor crash) or possibly gain hypervisor privileges
by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka
vHPET interrupt injection.
Notes
 mdeslaur> hypervisor packages are in universe. For
 mdeslaur> issues in the hypervisor, add appropriate
 mdeslaur> tags to each section, ex:
 mdeslaur> Tags_xen: universe-binary
Package
Source: xen (LP Ubuntu Debian)
Upstream:released (4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):needed
Ubuntu 19.10 (Eoan):needed
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-08-23 07:50:24 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)