CVE-2018-19961

Source
https://cve.org/CVERecord?id=CVE-2018-19961
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19961.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-19961
Downstream
Related
Published
2018-12-08T04:29:00.247Z
Modified
2026-02-23T08:13:10.132340Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.

References

Affected packages

Git / github.com/anymail/django-anymail

Affected ranges

Type
GIT
Repo
https://github.com/anymail/django-anymail
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*
v0.1
v0.1.dev1
v0.1.dev2
v0.10
v0.11
v0.2
v0.3
v0.4
v0.4.1
v0.5
v0.6
v0.7
v0.8
v0.9
v1.*
v1.0
v1.0.rc0
v1.1
v1.2
v1.3
v1.4
v2.*
v2.0
v2.1
v2.2
v3.*
v3.0
v4.*
v4.0
v4.1
v4.2
v4.3
v5.*
v5.0
v6.*
v6.0
v6.0.1
v6.1
v7.*
v7.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19961.json"