CVE-2018-19965

Source
https://cve.org/CVERecord?id=CVE-2018-19965
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19965.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-19965
Downstream
Related
Published
2018-12-08T04:29:00.420Z
Modified
2026-02-23T08:13:10.336220Z
Severity
  • 5.6 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.

References

Affected packages

Git / github.com/anymail/django-anymail

Affected ranges

Type
GIT
Repo
https://github.com/anymail/django-anymail
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*
v0.1
v0.1.dev1
v0.1.dev2
v0.10
v0.11
v0.2
v0.3
v0.4
v0.4.1
v0.5
v0.6
v0.7
v0.8
v0.9
v1.*
v1.0
v1.0.rc0
v1.1
v1.2
v1.3
v1.4
v2.*
v2.0
v2.1
v2.2
v3.*
v3.0
v4.*
v4.0
v4.1
v4.2
v4.3
v5.*
v5.0
v6.*
v6.0
v6.0.1
v6.1
v7.*
v7.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19965.json"